General
-
Target
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825.bin
-
Size
4.5MB
-
Sample
240903-1x4erayblq
-
MD5
873ea658869419d57eed1111ff20585c
-
SHA1
a9d8d5f05be687db300a2e864a63c98e2bfcd06a
-
SHA256
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825
-
SHA512
2e2535385a1de262a62fd13183a7d47402816fc45ddfd733b566a3e0a5937a90c13868cc405f24d720d2a0d830dee7e375e425c31635f0a0f4d732f0e79bf8af
-
SSDEEP
98304:1Ye8VKr2TJrvV8K7PxnPYPOfdfltw4XSnzw09xnmVOMRRp/0X:19r4JrvV8KlnPYPOfdfrwPvnmkq/0X
Static task
static1
Behavioral task
behavioral1
Sample
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825.apk
Behavioral task
behavioral2
Sample
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825.apk
Malware Config
Targets
-
-
Target
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825.bin
-
Size
4.5MB
-
MD5
873ea658869419d57eed1111ff20585c
-
SHA1
a9d8d5f05be687db300a2e864a63c98e2bfcd06a
-
SHA256
496fc7c217a81516c139b47c8ac97e83f8f1ae149a34ef3f84b4b388a9684825
-
SHA512
2e2535385a1de262a62fd13183a7d47402816fc45ddfd733b566a3e0a5937a90c13868cc405f24d720d2a0d830dee7e375e425c31635f0a0f4d732f0e79bf8af
-
SSDEEP
98304:1Ye8VKr2TJrvV8K7PxnPYPOfdfltw4XSnzw09xnmVOMRRp/0X:19r4JrvV8KlnPYPOfdfrwPvnmkq/0X
-
FluBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1