Resubmissions
11-06-2021 16:49
210611-9azca2rk72 811-06-2021 13:02
210611-xstgpe6j72 813-05-2021 11:41
210513-ca8exx1m7e 1013-05-2021 11:33
210513-bf5j79np5n 7Analysis
-
max time kernel
1703589s -
max time network
165s -
platform
android_x64 -
resource
android-x64 -
submitted
13-05-2021 11:41
Static task
static1
Behavioral task
behavioral1
Sample
bd005c1854ffb4f56ec4524825f49a61.apk
Resource
android-x64
General
-
Target
bd005c1854ffb4f56ec4524825f49a61.apk
-
Size
6.6MB
-
MD5
bd005c1854ffb4f56ec4524825f49a61
-
SHA1
cd02b2185af2e8785e2c506ee21e7b8a73a39f02
-
SHA256
2e6fc58f22d79504a3b29a58283a846371606da5f220a69abdb92a5e3a9667f6
-
SHA512
8fff9d70f15d94c4575e67dd0d7484f1a7c4d8cfdc997d23b3958510a33c8732ea09f6921c86101d8189c7ccabe203a74022946ba887d80e926474780eab0f0e
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json family_flubot -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json 3651 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/tWo.json 3651 com.tencent.mobileqq
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
63df4b9657c60ef96c128a712b4de7ed
SHA1837421b88e99925d334606d096b72e278ac7cf79
SHA25653584ecaa2bf784945e415420d44db7a2cfcd9bd771262f67e3996fba7b53e71
SHA512c2f63f33242a59d80e2524401cc64a8f4303e457d7f5ff2f4646c1b25d67f993ef3ecbb7884c0b6a86381acab411367a05b562ae64c396594380f722b6bd2ae5
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
9bda13af2fd82d5af344ab0f9255a6cf
SHA1d1b65df26806834491f38e47433b76958dda9de8
SHA256f10bb21e5370c77b9ee7d7a0182455ce411e52531332a116629a1960ddfcad73
SHA51219bda9dc7a81bda47a02a2a7597f749e946b197a7801896ed5c9b11bd204296dc7169161d91c3e87fa309f8437022a986ae420c9c39ea1eaf75ff96d0865ea85