Malware Analysis Report

2025-01-19 05:41

Sample ID 210818-qdfw4hnag2
Target d0ecde777a6805e6b63c8dd082bff71dd3434aab42271ff417971905f77d3a33.apk
SHA256 d0ecde777a6805e6b63c8dd082bff71dd3434aab42271ff417971905f77d3a33
Tags
flubot banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d0ecde777a6805e6b63c8dd082bff71dd3434aab42271ff417971905f77d3a33

Threat Level: Known bad

The file d0ecde777a6805e6b63c8dd082bff71dd3434aab42271ff417971905f77d3a33.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Requests enabling of the accessibility settings.

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-08-18 12:21

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-18 12:21

Reported

2021-08-18 12:24

Platform

android-x86-arm

Max time kernel

1496878s

Command Line

com.xunmeng.pinduoduo

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A
Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE N/A N/A N/A

Processes

com.xunmeng.pinduoduo

com.xunmeng.pinduoduo

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/tmp-base.apk.classes5954936489802270353.zip

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 bf3a1e0dd4c38b50f0952c747186d1f6
SHA1 4656d66180a7044f8efcacebca6c428f4a5c0c98
SHA256 20794840d9d9333aaa17726b250c511cd7a7d692a9a16bacab722fef51c74249
SHA512 3e827c32f38ce774c5533fc640b76deba08cadf61451a437c6a504b9703db4143a99fc1aa7f4a030d30a1725229b363ed08059b0bd78b3af87ec8440229bed2f

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 8336bd2c4226ed948c704d0c625cb912
SHA1 edc5d4fec1903f5ea9044e0ca97452937f080531
SHA256 3f80b88267e91529cd4d3cdf50055ff020677a3d8dfbaf817c33a2ed8fd99561
SHA512 2aa11506b257afecded4451c7febe8a987e2410985bebd3a9f14bd1aa0a4d540d18edb23a67425f11d8f1aee859b2d98b80512540726bc29b60c3903a828d70d

/data/user/0/com.xunmeng.pinduoduo/shared_prefs/multidex.version.xml

MD5 76c5ede9570d91ebf0e6efcc54901d8f
SHA1 796b5566f221e780dcc423c71a527559660c3dcf
SHA256 35cbb200335f163f1f8da37cdd05e0a0bbe09edd9469620f65587ce639d909b7
SHA512 9eccd5aeb05dc53906bf1b7242a4d8b434b434677a2cf2a0335123c889db494c755cb982bdcf36264fa46e26e27ccdf790a8c250a5003f9b8f26377acc880e65

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/shared_prefs/Voicemail.xml

MD5 cd0ea213988d744c8c9c7048d1660f80
SHA1 dd9a1580296e9548b819db05d82684de29349065
SHA256 9e9f84d6886b0b7d736d5342297f1b5352a5be17e22cdf2c9a970151d0c001cb
SHA512 e0246612a0abaaa74ed7afb7c5edbc44158b07326b9b4ab020cefce57c38245d8ff2e9d6b8fda48fc12f04e3a2df17786c0832b9cdaf47ab438e5146b4719f2f