General

  • Target

    8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.bin

  • Size

    4.8MB

  • Sample

    250409-15cxrstycw

  • MD5

    afa0e0d9a5a4c04cc27529611cc14e10

  • SHA1

    2c7eda5dd664bca45e46366fd73f868f59aa498a

  • SHA256

    8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97

  • SHA512

    6f8ec0148e7d4d016f23569d1777890b2fd5d24c8ee0bc4193311005e41faec97484c9b7ddb1981fb0fcd798c45a33254d2283297e8365a32bde90288dddb16f

  • SSDEEP

    98304:nntSFACZS4YkeOocf0GyqUzhLvS2EuCgvTMPAgi8BFp/BZd4AnObpD1YsFn6:ntS/ZtYkNocf0GDGu2EuJvIPm8BFFdLf

Malware Config

Targets

    • Target

      8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.bin

    • Size

      4.8MB

    • MD5

      afa0e0d9a5a4c04cc27529611cc14e10

    • SHA1

      2c7eda5dd664bca45e46366fd73f868f59aa498a

    • SHA256

      8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97

    • SHA512

      6f8ec0148e7d4d016f23569d1777890b2fd5d24c8ee0bc4193311005e41faec97484c9b7ddb1981fb0fcd798c45a33254d2283297e8365a32bde90288dddb16f

    • SSDEEP

      98304:nntSFACZS4YkeOocf0GyqUzhLvS2EuCgvTMPAgi8BFp/BZd4AnObpD1YsFn6:ntS/ZtYkNocf0GDGu2EuJvIPm8BFFdLf

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Flubot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v16

MITRE ATT&CK Mobile v16

Tasks