Malware Analysis Report

2025-01-19 05:42

Sample ID 210813-94pe4nhtv2
Target 7d8ecd35868f24d7ebe3b0c3a3d234b4a4451e5b5c0675220e561026963ccd4f.apk
SHA256 7d8ecd35868f24d7ebe3b0c3a3d234b4a4451e5b5c0675220e561026963ccd4f
Tags
flubot banker infostealer obfuscation ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7d8ecd35868f24d7ebe3b0c3a3d234b4a4451e5b5c0675220e561026963ccd4f

Threat Level: Known bad

The file 7d8ecd35868f24d7ebe3b0c3a3d234b4a4451e5b5c0675220e561026963ccd4f.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation ransomware trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Requests enabling of the accessibility settings.

Loads dropped Dex/Jar

Reads name of network operator

Uses Crypto APIs (Might try to encrypt user data).

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-13 08:42

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-13 08:42

Reported

2021-08-13 08:45

Platform

android-x64-arm64

Max time kernel

1051715s

Max time network

157s

Command Line

slight.glare.rail

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/slight.glare.rail/app_DynamicOptDex/KfhdqoP.json N/A N/A
N/A /data/user/0/slight.glare.rail/app_DynamicOptDex/KfhdqoP.json N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Reads name of network operator

Description Indicator Process Target
Framework API call android.telephony.TelephonyManager.getNetworkOperatorName N/A N/A

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A
Acesses field javax.security.auth.x500.X500Principal.thisX500Name N/A N/A N/A

Processes

slight.glare.rail

Network

Country Destination Domain Proto
N/A 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
N/A 1.1.1.1:853 tcp
N/A 142.250.178.14:443 udp
N/A 1.1.1.1:853 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 8.8.4.4:443 tcp
N/A 1.1.1.1:853 tcp
N/A 1.1.1.1:853 tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 216.239.35.4:123 time.android.com udp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp
N/A 213.231.134.136:80 gurjealmokihfsa.ru tcp

Files

/data/user/0/slight.glare.rail/app_DynamicOptDex/KfhdqoP.json

MD5 5f77f0b74f2a82fa3304bc4b11418913
SHA1 3f7c5a189b91ec220c2c88623096455b7cc9018c
SHA256 283bbb11cd3eef603a1ea0bc390230825c5b8eda90462c700d59f143abc0f392
SHA512 6628ee8a81f3a393a6626d50e27bd0d93945943b88abbe9886e9d42c2a7350c83d025812266bceb75ba329572d32c76fe1881ee7fc2e641577f977a55e970744

/data/user/0/slight.glare.rail/app_DynamicOptDex/KfhdqoP.json

/data/user/0/slight.glare.rail/app_DynamicOptDex/KfhdqoP.json

MD5 40bc23344a0f46f04cf0533ae12c86b4
SHA1 4330aa71cc6bce9eac084368d207f1aeeabbec50
SHA256 e89d9804064dfff2a9890e595825a3074f88ffcbfe7c21800a9464d2aa9ab832
SHA512 e2e32639b3080412ee5a4f898c7ed8f422e854bd8e759402d21eb2620333a60170f80e21998dbe3e2ec652a3c7dc1ff8528c52d5df7a95a35046811b752d4f45

/data/user/0/slight.glare.rail/app_DynamicOptDex/oat/KfhdqoP.json.cur.prof

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/slight.glare.rail/shared_prefs/UPS Mobile.xml

MD5 5bd7f0119f69ef6b62e8f557034eded7
SHA1 26c5d5d99e0ca0c23b86f10d7fd91e5bace6b8e8
SHA256 0a9672293e3f07ad37974d50efa4e0ebec098ec4fd6b2c0b86a9ca5e1026861d
SHA512 83216a751d8b673fa6fcbbcd3a89e1cfecb6874f2a5823ff864bf2d48b1008048996adc3d911f58e56a3708e24a3f4c6f2d00569c68de369c2565cc64b7ba7c6

/data/user/0/slight.glare.rail/shared_prefs/UPS Mobile.xml

MD5 c5f6e7e23a38ef7ab0b2dba9ede1fd5e
SHA1 c1e051e2786a701ed81c17bccd04a219457869bd
SHA256 8b4c8fe3aad9c91edec32a6fb5c5a1c0b7eb172ef6e74c191305c166663d108d
SHA512 9740aa047e87f8d3cfe364dcb6bede8364d832668b2462c6f48ab5aa5f9b1813617a40988bd8bb3a7a99a53bbae0248e9fb098c66941959b3d7550a83fc8aacc

/data/user/0/slight.glare.rail/shared_prefs/UPS Mobile.xml

MD5 6aadeaed0ffeac9aee1449eab77d8267
SHA1 64b9bce8e5cac208987373b55fccd8c5153b794b
SHA256 a40296d35f79d99ddb393707efc2dd71957f3d109188e1833c7c3580ce28e786
SHA512 e0fb54f26ad12b65069493961ccb5e03ee7ee0717f70ffb992d4957eae6e7d84cef08f7d294879ae6f17f10e97a6b120d84293fe8649da275c920d8ee90ba279