Malware Analysis Report

2025-01-19 05:42

Sample ID 210812-g88eska2hn
Target f69231c51bc535cd517d48a5269f794c7edacb38c24ce323b2716033fa1310a8.apk
SHA256 f69231c51bc535cd517d48a5269f794c7edacb38c24ce323b2716033fa1310a8
Tags
flubot banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f69231c51bc535cd517d48a5269f794c7edacb38c24ce323b2716033fa1310a8

Threat Level: Known bad

The file f69231c51bc535cd517d48a5269f794c7edacb38c24ce323b2716033fa1310a8.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-12 12:21

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-12 12:21

Reported

2021-08-12 12:24

Platform

android-x86-arm

Max time kernel

978445s

Command Line

com.iqiyi.i18n

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.iqiyi.i18n

com.iqiyi.i18n

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/tmp-base.apk.classes2580273105614214914.zip

MD5 4380d8f1d5f0d052897a855742e4e0e3
SHA1 67c8b67505d7bd4c5f196426efc88b32a25c6559
SHA256 56e454f96953cb6936719f3288fea7fcd286f8bc46bd5c28712265b9a6c3bc69
SHA512 48d0414c0478ce01638d3424ea8cfd3732c50d8cff95b03a64de56e0b70245cf97adc2771b737bb240dacaf9c4404a8cda3efe5d749cff91a5be3b6a9b14bf7d

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 47f097ea0094c3daeb9490c80de77ed7
SHA1 e58c20b0136539b984aa2fe4764a06b25d2ae8d7
SHA256 cbf414292a0dd1af690df5c70c64e5cc03b9f03f4c9d5ca80a4ff517519d4ba1
SHA512 b3ecde9f291a5a1163167b57b52b3c12a47c0dfb9a1e259881d6cf4e05c45cbd6798b62ca15655c2204e6bc1ef3366518eead6db845db744f3cae28f62d4441a

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 7ccc15bea9ad25fb1f1d96bc60c8e1dd
SHA1 2cf7a883cdf4c1b3684cd63efccaa9539a222aee
SHA256 4ebf668df2ee60180387a84a11de8db58d7c55a0fec2e46607a0921b8e32e237
SHA512 85c48b9d70c270819cd7ed640c7b846d96faee4dd5782fa33bf12b50ba6d92d7f7601b9ac9347547b8231aedfc39ae53e68a2d0f55d015917a65e3e4d09ec6b9

/data/user/0/com.iqiyi.i18n/shared_prefs/multidex.version.xml

MD5 040d9afbadb730671d1eabffdae49336
SHA1 23b1d051d8d08cd8d768ae2c0280f87d91558a2d
SHA256 6cce68b7b7c3c5423646c1eec63d24b920e3976323e76f4e5ea29f62ef1f4fd0
SHA512 f39e45f343126235e21422733756d71bfe9ebb4d9fee5dde853d923f86f0a4d925268826ab5d198835e27dedf11bcdb00f20c28c7163db0be393037c0f7a8f3b

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 06c331614f0ad8fa4c7a8e253781949a
SHA1 53f314e71c1fd384a9975fce66907a1b17321ac6
SHA256 e024ed7d883c92776485270b97139d71c5e1d1d149aef613740f64e69026ee11
SHA512 fdf03ce615d14037f646104466183e65ee07d01446d786447236684e4d335adcadafab15aea7dc2d1a93254ac9aca7e69bfc8ea729d426d097d18bf8c8ace77b

/data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 f6553449c8c4056b3bfc7af7446b6dd6
SHA1 a4ddaee2ae4fc73bf852687c5202f1590a1de2f1
SHA256 a353b4c58a85668aa27863115ee18e253896bea085e9632a21fabcc477d2b371
SHA512 cd3fe7a14deb5709c099085fea4c30affd5ea093e3ab04392095b2d19b18a8797109b5420f9fc1d081d78123806f46a2ffca0ae98b04d1b049d7b2b3893cc761

/data/user/0/com.iqiyi.i18n/shared_prefs/Voicemail.xml

MD5 748e1117f687f3a76eb8684ae5b11c31
SHA1 5b10efeb3287224aa7c3ae367b2697349ee3c42d
SHA256 6e3020890e90a63f6720cc605a49aebe4d0b34d0e42d0793f7f3a4e80bbd95a2
SHA512 20f72c4240b5692c4dbf2c42bd6358f29684a08a14d54de90ddd1259848408b6c4efa45968909d7097756e52015a457af31fa163923acf84e12aa0927bb2061f