Resubmissions

11-06-2021 16:49

210611-9azca2rk72 8

11-06-2021 13:02

210611-xstgpe6j72 8

13-05-2021 11:41

210513-ca8exx1m7e 10

13-05-2021 11:33

210513-bf5j79np5n 7

Analysis

  • max time kernel
    1703589s
  • max time network
    165s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    13-05-2021 11:41

General

  • Target

    bd005c1854ffb4f56ec4524825f49a61.apk

  • Size

    6.6MB

  • MD5

    bd005c1854ffb4f56ec4524825f49a61

  • SHA1

    cd02b2185af2e8785e2c506ee21e7b8a73a39f02

  • SHA256

    2e6fc58f22d79504a3b29a58283a846371606da5f220a69abdb92a5e3a9667f6

  • SHA512

    8fff9d70f15d94c4575e67dd0d7484f1a7c4d8cfdc997d23b3958510a33c8732ea09f6921c86101d8189c7ccabe203a74022946ba887d80e926474780eab0f0e

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.tencent.mobileqq
    1⤵
    • Loads dropped Dex/Jar
    PID:3651

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/tWo.json.cur.prof

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json

    MD5

    63df4b9657c60ef96c128a712b4de7ed

    SHA1

    837421b88e99925d334606d096b72e278ac7cf79

    SHA256

    53584ecaa2bf784945e415420d44db7a2cfcd9bd771262f67e3996fba7b53e71

    SHA512

    c2f63f33242a59d80e2524401cc64a8f4303e457d7f5ff2f4646c1b25d67f993ef3ecbb7884c0b6a86381acab411367a05b562ae64c396594380f722b6bd2ae5

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.tencent.mobileqq/shared_prefs/FedEx.xml

    MD5

    9bda13af2fd82d5af344ab0f9255a6cf

    SHA1

    d1b65df26806834491f38e47433b76958dda9de8

    SHA256

    f10bb21e5370c77b9ee7d7a0182455ce411e52531332a116629a1960ddfcad73

    SHA512

    19bda9dc7a81bda47a02a2a7597f749e946b197a7801896ed5c9b11bd204296dc7169161d91c3e87fa309f8437022a986ae420c9c39ea1eaf75ff96d0865ea85