General

  • Target

    05f05f48b07c46ee14f665451d46010a958d420ea744b701159f68bc58dadd20.bin

  • Size

    4.4MB

  • Sample

    241231-1w1mgatpem

  • MD5

    cf1094b291bfb104953ec20f9f99b69c

  • SHA1

    bc39ecb0caa34146eb69f6a6663513f4a2fd5975

  • SHA256

    05f05f48b07c46ee14f665451d46010a958d420ea744b701159f68bc58dadd20

  • SHA512

    e44bd3fec728ac444dc51c1f489085af4082d4727a980594bc0677e07e249cd644945cc8ddb20816ec70270de24ffee71cc4d9e1d440adb52b778622f52a8b7c

  • SSDEEP

    98304:WoWhlhDyAL01EpZ7CAwIZBcduq6A+QQYJMYKNYBNmCkP:hWhlYALWEpZ7b/Uu7A3MYKCBACkP

Malware Config

Targets

    • Target

      05f05f48b07c46ee14f665451d46010a958d420ea744b701159f68bc58dadd20.bin

    • Size

      4.4MB

    • MD5

      cf1094b291bfb104953ec20f9f99b69c

    • SHA1

      bc39ecb0caa34146eb69f6a6663513f4a2fd5975

    • SHA256

      05f05f48b07c46ee14f665451d46010a958d420ea744b701159f68bc58dadd20

    • SHA512

      e44bd3fec728ac444dc51c1f489085af4082d4727a980594bc0677e07e249cd644945cc8ddb20816ec70270de24ffee71cc4d9e1d440adb52b778622f52a8b7c

    • SSDEEP

      98304:WoWhlhDyAL01EpZ7CAwIZBcduq6A+QQYJMYKNYBNmCkP:hWhlYALWEpZ7b/Uu7A3MYKCBACkP

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Flubot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks