General

  • Target

    c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.bin

  • Size

    4.6MB

  • Sample

    250420-1yh57sxmy6

  • MD5

    2ef09cf7dd58f0dcc2b537abab1904f6

  • SHA1

    602996d906e25b9540e56e5adc7a5d9c6daec5ea

  • SHA256

    c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133

  • SHA512

    47a8e5cd02e8d9e2d45a38712e496454ebbf69bdca892ac59aa5e4446ca90cedc86f29020ed1247b897fb942f14cfc08350c2a1db90b570d8456b373c5a54c1b

  • SSDEEP

    98304:rNPYedT1FpVjDacKJ4qU58PcuIAJjoDrRz7uWAbDRb+BFZxyfRrsrRL:rNPYaFrOFCv8dbEdz7uWA3RbwPYfRwZ

Malware Config

Targets

    • Target

      c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.bin

    • Size

      4.6MB

    • MD5

      2ef09cf7dd58f0dcc2b537abab1904f6

    • SHA1

      602996d906e25b9540e56e5adc7a5d9c6daec5ea

    • SHA256

      c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133

    • SHA512

      47a8e5cd02e8d9e2d45a38712e496454ebbf69bdca892ac59aa5e4446ca90cedc86f29020ed1247b897fb942f14cfc08350c2a1db90b570d8456b373c5a54c1b

    • SSDEEP

      98304:rNPYedT1FpVjDacKJ4qU58PcuIAJjoDrRz7uWAbDRb+BFZxyfRrsrRL:rNPYaFrOFCv8dbEdz7uWA3RbwPYfRwZ

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot payload

    • Flubot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v16

MITRE ATT&CK Mobile v16

Tasks