General
-
Target
831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk
-
Size
4.8MB
-
Sample
250108-gwvxfazlfn
-
MD5
c10d38a63e776e5940d281bddbb497d4
-
SHA1
ac0561ee9acc38c138409d03a24bdd992a5b1d96
-
SHA256
831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b
-
SHA512
a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5
-
SSDEEP
98304:5qBTEbLg6IcV1bVGgecr2uoyoqxQ7jjrXJ7dGK4z11GafG63W3KL:5BGcV1bVbjCuoyoqxIxGKk1QafN3BL
Static task
static1
Behavioral task
behavioral1
Sample
831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk
-
Size
4.8MB
-
MD5
c10d38a63e776e5940d281bddbb497d4
-
SHA1
ac0561ee9acc38c138409d03a24bdd992a5b1d96
-
SHA256
831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b
-
SHA512
a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5
-
SSDEEP
98304:5qBTEbLg6IcV1bVGgecr2uoyoqxQ7jjrXJ7dGK4z11GafG63W3KL:5BGcV1bVbjCuoyoqxIxGKk1QafN3BL
-
FluBot payload
-
Flubot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1