General

  • Target

    3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.bin

  • Size

    3.4MB

  • Sample

    240902-1xqtnaybjq

  • MD5

    83c3142eeb1fc5a3d88807c0c738c543

  • SHA1

    f0e99360e5c78ed7b8b3d08abc58aaebc9daf4c8

  • SHA256

    3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185

  • SHA512

    94741012e99c9685cdf7354117074f40e1f3ac4f60f934279745ceb5146eccf31701a44b23d728ad3d9c52a95af6a00dbd5bc1366bc7fb9fa2a0127b27926bdd

  • SSDEEP

    98304:dKi5SaYvkjZRFJjAC7mc7KAndX42bIeIJ7l:tS6j7FJdx7lnh4kIDx

Malware Config

Targets

    • Target

      3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.bin

    • Size

      3.4MB

    • MD5

      83c3142eeb1fc5a3d88807c0c738c543

    • SHA1

      f0e99360e5c78ed7b8b3d08abc58aaebc9daf4c8

    • SHA256

      3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185

    • SHA512

      94741012e99c9685cdf7354117074f40e1f3ac4f60f934279745ceb5146eccf31701a44b23d728ad3d9c52a95af6a00dbd5bc1366bc7fb9fa2a0127b27926bdd

    • SSDEEP

      98304:dKi5SaYvkjZRFJjAC7mc7KAndX42bIeIJ7l:tS6j7FJdx7lnh4kIDx

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks