General

  • Target

    822f7878e84b144dc41bd5d2ed3a20df1078ea8a18b6fcc80283aac7137c8e47.bin

  • Size

    3.8MB

  • Sample

    240903-1yd69azbka

  • MD5

    0f02594634a633ff2e2efca9760a06d5

  • SHA1

    0e18d7a6e1c7cfdc4e7aa78edf6f12337599c5b2

  • SHA256

    822f7878e84b144dc41bd5d2ed3a20df1078ea8a18b6fcc80283aac7137c8e47

  • SHA512

    f70ce28dd8509c0aec437bb87f6c147fe9661c58f5c4f55f85884f5466a884efe05d4420270627379462813b215a4c97e4eae2193bc811c96c178af44d576c7d

  • SSDEEP

    98304:qPTZq21ENBavGDspPfTOcPWx/SdgNwD3kLMS6:qbZqgEN4vmspTxoO

Malware Config

Targets

    • Target

      822f7878e84b144dc41bd5d2ed3a20df1078ea8a18b6fcc80283aac7137c8e47.bin

    • Size

      3.8MB

    • MD5

      0f02594634a633ff2e2efca9760a06d5

    • SHA1

      0e18d7a6e1c7cfdc4e7aa78edf6f12337599c5b2

    • SHA256

      822f7878e84b144dc41bd5d2ed3a20df1078ea8a18b6fcc80283aac7137c8e47

    • SHA512

      f70ce28dd8509c0aec437bb87f6c147fe9661c58f5c4f55f85884f5466a884efe05d4420270627379462813b215a4c97e4eae2193bc811c96c178af44d576c7d

    • SSDEEP

      98304:qPTZq21ENBavGDspPfTOcPWx/SdgNwD3kLMS6:qbZqgEN4vmspTxoO

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks