General

  • Target

    1c913370a7b70088c933f90fcebb2077264b905fbb812a0b01aabc7e4990da61.zip

  • Size

    3.8MB

  • Sample

    250325-ml8y7svtdw

  • MD5

    856aa4cbffb8a0915be72a9ebd49dd27

  • SHA1

    9e5ec1bccc6f76f67093902d231105119fff747a

  • SHA256

    1c913370a7b70088c933f90fcebb2077264b905fbb812a0b01aabc7e4990da61

  • SHA512

    e93e75a1c90ef67b9b51ca34511f38b7893c65212b18f3089d60022738a7867d44737f790110ceab188929f375bcbf77c8eeb1fed34a1ed9274ed55b9a6c44d6

  • SSDEEP

    98304:rkJ+oTd/Nk+5OpZ60sONhlRvh4oCcuDz8Reqq:r6+y1q+50ZTpNbRWiu1qq

Malware Config

Targets

    • Target

      6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk

    • Size

      4.0MB

    • MD5

      1edd97885a8a7e88694be9971ac317e5

    • SHA1

      64c4b39176709a7fa9be936b925b17fb53544da9

    • SHA256

      6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e

    • SHA512

      2aa25bae46e2c3f1ebdd2360c378f711ebc40fe82f9541d6a52d48f3ee14f46801a7125d6b02afdeaa342dfd96b6b22017cf7011e81fad749ce864b1703a077a

    • SSDEEP

      98304:s5knISHh3FZNqsf44bTUIYiFZBrzXUpBJ1FS3VfTvOGn/Ms:oknhlj7bUIYi5rzXUbJ1FS3VOGn/Ms

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Flubot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks