General
-
Target
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.bin
-
Size
3.4MB
-
Sample
240902-1xqtnaybjq
-
MD5
83c3142eeb1fc5a3d88807c0c738c543
-
SHA1
f0e99360e5c78ed7b8b3d08abc58aaebc9daf4c8
-
SHA256
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185
-
SHA512
94741012e99c9685cdf7354117074f40e1f3ac4f60f934279745ceb5146eccf31701a44b23d728ad3d9c52a95af6a00dbd5bc1366bc7fb9fa2a0127b27926bdd
-
SSDEEP
98304:dKi5SaYvkjZRFJjAC7mc7KAndX42bIeIJ7l:tS6j7FJdx7lnh4kIDx
Static task
static1
Behavioral task
behavioral1
Sample
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185.bin
-
Size
3.4MB
-
MD5
83c3142eeb1fc5a3d88807c0c738c543
-
SHA1
f0e99360e5c78ed7b8b3d08abc58aaebc9daf4c8
-
SHA256
3865302b66b0efee4ab31130cefdeff55c2e269c7d6dd03c0673134f98254185
-
SHA512
94741012e99c9685cdf7354117074f40e1f3ac4f60f934279745ceb5146eccf31701a44b23d728ad3d9c52a95af6a00dbd5bc1366bc7fb9fa2a0127b27926bdd
-
SSDEEP
98304:dKi5SaYvkjZRFJjAC7mc7KAndX42bIeIJ7l:tS6j7FJdx7lnh4kIDx
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-