General
-
Target
1a569aee63ca83bea22dd2f3cbe00dadcb1e5a1cf32be959890f0ccc8ad10e81.zip
-
Size
3.2MB
-
Sample
250325-lxm1faxqs9
-
MD5
2f318d0553e9c37abb048d98473f7cca
-
SHA1
9cbd254230d75b622b6b44a976e392fda43b2967
-
SHA256
1a569aee63ca83bea22dd2f3cbe00dadcb1e5a1cf32be959890f0ccc8ad10e81
-
SHA512
7da2c749465d402f42eb003cf0119c2b959a9ddcde45158f03edb4f50d2cb8e129bf2ee200537daeae120c943cfac4d117c20b7880896d41d64252ac43bf9627
-
SSDEEP
49152:CaHeXKmp9PPzV5Wyym+8AVj3olhZuxag5BQUzMF/UXChC7PbRIXAH7/:CYY9x5LK3tx35BQUzMGXChsWXu7/
Static task
static1
Behavioral task
behavioral1
Sample
fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2.apk
-
Size
3.3MB
-
MD5
af9f032aecbb2c3a4f5eed9b5f675419
-
SHA1
a0ab0777891553d9c1dced5fdafe2b9e1d5b341e
-
SHA256
fc45b5f85cee56830a9f7e3001dca42026a9691445afa8f429b57203fc47a1b2
-
SHA512
abec508e52c01e4b2dd822d029629eb82304faba5b8f43c0cb3566f17490ef82e644ff5e270bcfdc595d49e81ca54d40e1c59341f659e5a66bf9f97792fbe2ed
-
SSDEEP
98304:Q7KGt3ZuI7y690JAD/oD4bSMI6/LTdCH93:QeGfuI7y2oDbV
-
FluBot payload
-
Flubot family
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-