Malware Analysis Report

2025-01-19 05:41

Sample ID 210817-p5yzeradya
Target 34c9c73ff73d72986f4e77534aa4496319c7bae59115501bfde127fbf2ddce63.apk
SHA256 34c9c73ff73d72986f4e77534aa4496319c7bae59115501bfde127fbf2ddce63
Tags
flubot banker infostealer obfuscation ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

34c9c73ff73d72986f4e77534aa4496319c7bae59115501bfde127fbf2ddce63

Threat Level: Known bad

The file 34c9c73ff73d72986f4e77534aa4496319c7bae59115501bfde127fbf2ddce63.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation ransomware trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses Crypto APIs (Might try to encrypt user data).

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-17 07:30

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-17 07:30

Reported

2021-08-17 07:33

Platform

android-x86-arm

Max time kernel

1393010s

Command Line

com.bilibili.app.in

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs N/A N/A
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs N/A N/A
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs N/A N/A

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.bilibili.app.in

com.bilibili.app.in

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs

MD5 eb31e0176bf8aecdab1dc5b30ae5c79a
SHA1 299e8718b210e10b474061a97e764402521d5f13
SHA256 b464cced187d2a418e14d190c4be4a6ccaf1343ff4ec70ff62eb1a50092c55da
SHA512 a1a20e397bdd9e2ed4b732ed4ff825b574601f01c7f2f551672119bfd71b1da2e5107ba3269d7f643756db52becfa9c1c31f8bac215abec68ecf4ef5ef471f71

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/SwjiZZV0.vdex

MD5 4ef98c8a4ca27d415428aad5ed398222
SHA1 432367d3fc448fbecfe5b279db66007c1a0b3832
SHA256 f4cc7ec04fead99df7c0ff794fe62bae24a0ff48fc310c7051612e04f0188320
SHA512 c45b7f54a23760e04b09e33aba9378e71fa93faf9396fb5d209ef9a30b139e4c02c1c92a87a5f15327e1afa415fb962d48a92cfc74489cfa9117999f066fbcf2

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/SwjiZZV0.odex

MD5 937cb8d14109a3a29996720c0631273c
SHA1 60b0ec0de9c0cd30c7de0e08e042d900b99c18d8
SHA256 cf8ff4b46b24b8661e34422b0265bcbd2600090072e13c066ab188b8f5b15545
SHA512 2fc827f7c00e1d9c248cbf962beb69379c52ae56c166fa8c1382f28df24b2d827e76a29bb02c82ef6d8c596d2beeede939c48d5d55745769b2876ed5084bd015

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/SwjiZZV0.nfs

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/shared_prefs/DHL.xml

MD5 7e7823d50be8dc93d03024600711e83e
SHA1 8b8e3fdcf1143fa33b1f4b25cafdb4690cb892ae
SHA256 cc14af3f6537b05a018bc33caa97f9313784bc6853c177ccd9996f169559e9d9
SHA512 447d937806d8aaf665d4e2f468ed11b42cd4edbe57f8387fac92323761514e72f7e6ab8f07c558b851a4fa018d7bf11cade1b14a888e2e122ca8a1082d2b443a