General

  • Target

    cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c

  • Size

    5.4MB

  • Sample

    240902-me9bdsygmb

  • MD5

    c06aa910841cf4c7f020b9a6f30663d3

  • SHA1

    39f8fc6e4ad8f3fbf6d26542dae6ef704be42a0c

  • SHA256

    cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c

  • SHA512

    899067119bd7918b5e98779ac6367f17fdc53c1d62aecad164c504b338c974adaf46d7055fc68c69d881144ea263972dd77392d4059b123b697e16c5b0dc76c2

  • SSDEEP

    98304:bg6Bvfymd5SsncjHaX642ziJO+k0Z51iMvmHj1gDOQntmsS8yU2Kac6ur2ftPQ/S:E6Yms+K42sdDZ51NSgi6tvkcsft2S

Malware Config

Targets

    • Target

      cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c

    • Size

      5.4MB

    • MD5

      c06aa910841cf4c7f020b9a6f30663d3

    • SHA1

      39f8fc6e4ad8f3fbf6d26542dae6ef704be42a0c

    • SHA256

      cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c

    • SHA512

      899067119bd7918b5e98779ac6367f17fdc53c1d62aecad164c504b338c974adaf46d7055fc68c69d881144ea263972dd77392d4059b123b697e16c5b0dc76c2

    • SSDEEP

      98304:bg6Bvfymd5SsncjHaX642ziJO+k0Z51iMvmHj1gDOQntmsS8yU2Kac6ur2ftPQ/S:E6Yms+K42sdDZ51NSgi6tvkcsft2S

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.