This study contains a detailed technical report prepared after analysing the samples found in numerous campaigns detected that spoof messaging services, in order to identify the family to which this malicious code belongs, and the actions it carries out, collecting the greatest possible quantity of information.
An IOC rule and a Yara rule are also available in this analysis to help with detecting samples belonging to the FluBot family.
- General information.
- Summary of actions.
- Detailed analysis.
- Anti-detection and anti-reverse engineering techniques.