FluBot is a multi-purpose mobile banking malware that was first observed in Spain in late 2020. It primarily spread through European countries using a variety of SMS phishing messages in multiple languages.[1][2] An international law enforcement operation of 11 countries eventually disrupted the spread of FluBot.[3]
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1517 | Access Notifications | ||
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
FluBot can use HTTP POST requests on port 80 for communicating with its C2 server.[1] |
Mobile | T1637 | .001 | Dynamic Resolution: Domain Generation Algorithms |
FluBot can use Domain Generation Algorithms to connect to the C2 server.[1] |
Mobile | T1521 | .002 | Encrypted Channel: Asymmetric Cryptography |
FluBot has encrypted C2 message bodies with RSA and encoded them in base64.[1] |
Mobile | T1646 | Exfiltration Over C2 Channel | ||
Mobile | T1628 | .002 | Hide Artifacts: User Evasion |
FluBot can use |
Mobile | T1629 | .001 | Impair Defenses: Prevent Application Removal |
FluBot can use Accessibility Services to make removal of the malicious app difficult.[2] |
.003 | Impair Defenses: Disable or Modify Tools |
FluBot can disable Google Play Protect to prevent detection.[1][3] |
||
Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
FluBot can add display overlays onto banking apps to capture credit card information.[1] |
Mobile | T1406 | Obfuscated Files or Information |
FluBot can obfuscated class, string, and method names in newer malware versions.[1] |
|
Mobile | T1660 | Phishing |
FluBot has been distributed via malicious links in SMS messages.[3] |
|
Mobile | T1636 | .003 | Protected User Data: Contact List |
FluBot has used the contact list to infect more devices.[1][3] |
.004 | Protected User Data: SMS Messages |
FluBot can intercept SMS messages and USSD messages from Telcom operators.[1] |
||
Mobile | T1604 | Proxy Through Victim | ||
Mobile | T1582 | SMS Control |
FluBot can send SMS phishing messages to other contacts on an infected device.[1][2] |
|
Mobile | T1409 | Stored Application Data |
FluBot has collected credentials, banking details and other information from the victim device.[3] |