General
-
Target
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.bin
-
Size
4.8MB
-
Sample
250409-15cxrstycw
-
MD5
afa0e0d9a5a4c04cc27529611cc14e10
-
SHA1
2c7eda5dd664bca45e46366fd73f868f59aa498a
-
SHA256
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97
-
SHA512
6f8ec0148e7d4d016f23569d1777890b2fd5d24c8ee0bc4193311005e41faec97484c9b7ddb1981fb0fcd798c45a33254d2283297e8365a32bde90288dddb16f
-
SSDEEP
98304:nntSFACZS4YkeOocf0GyqUzhLvS2EuCgvTMPAgi8BFp/BZd4AnObpD1YsFn6:ntS/ZtYkNocf0GDGu2EuJvIPm8BFFdLf
Static task
static1
Behavioral task
behavioral1
Sample
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97.bin
-
Size
4.8MB
-
MD5
afa0e0d9a5a4c04cc27529611cc14e10
-
SHA1
2c7eda5dd664bca45e46366fd73f868f59aa498a
-
SHA256
8e4307f958ef3e5c62e3f0c75176044be90c4863fa546a19a716635379367b97
-
SHA512
6f8ec0148e7d4d016f23569d1777890b2fd5d24c8ee0bc4193311005e41faec97484c9b7ddb1981fb0fcd798c45a33254d2283297e8365a32bde90288dddb16f
-
SSDEEP
98304:nntSFACZS4YkeOocf0GyqUzhLvS2EuCgvTMPAgi8BFp/BZd4AnObpD1YsFn6:ntS/ZtYkNocf0GDGu2EuJvIPm8BFFdLf
-
FluBot payload
-
Flubot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Enterprise v16
MITRE ATT&CK Mobile v16
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1