Malware Analysis Report

2025-01-19 05:41

Sample ID 210907-mhntvscdb2
Target Voicemail92.apk
SHA256 d1340ed4d24a213ba11b01cc35341c101b25f2317cff99093f428152a2fc634e
Tags
flubot banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d1340ed4d24a213ba11b01cc35341c101b25f2317cff99093f428152a2fc634e

Threat Level: Known bad

The file Voicemail92.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-07 10:28

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-07 10:28

Reported

2021-09-07 10:31

Platform

android-x86-arm

Max time kernel

3218043s

Command Line

com.xunmeng.pinduoduo

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.xunmeng.pinduoduo

com.xunmeng.pinduoduo

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/tmp-base.apk.classes4968163688434846368.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 bf3a1e0dd4c38b50f0952c747186d1f6
SHA1 4656d66180a7044f8efcacebca6c428f4a5c0c98
SHA256 20794840d9d9333aaa17726b250c511cd7a7d692a9a16bacab722fef51c74249
SHA512 3e827c32f38ce774c5533fc640b76deba08cadf61451a437c6a504b9703db4143a99fc1aa7f4a030d30a1725229b363ed08059b0bd78b3af87ec8440229bed2f

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/shared_prefs/multidex.version.xml

MD5 75f4beb4b27c529802d2f51a6fce70b0
SHA1 5ae9e4d1bb70f9ff1e63ef86d38f1eb95fe0b57d
SHA256 134a7409362ec77767a74c751b8ec1a542c520371857533c7c57b8467a3e3d4f
SHA512 a6e59b40900f41882ec585c549a166ff8a52e68fd42df5356cb9a0d4fbeedee7830bf02d46c171b1b14be3eb1651955a03f316fc9f83b721dcfc84aab74eb631

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.xunmeng.pinduoduo/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 f18c824bb048ebe88da28999440b825e
SHA1 b1726f8152a2561ae4c989ddc1adae524dded00b
SHA256 a2e0b9ffe3edbff77d9521b44ddfda5b54a45e3efffa16c7d2c46ffc354246bf
SHA512 f9178070fb2b9539ad51e93a8b6df2ca7e50ad67eafac806aba1bc166d133d071398df609bf752bbacb0196275c68d314c581cdc6e19ed50b0c7de8e9cc1a270

/data/user/0/com.xunmeng.pinduoduo/shared_prefs/Voicemail.xml

MD5 3b092a9da13454ca039b2b10e682c6eb
SHA1 b139b75030a171ab044c2f9c5301a247e9b4bae4
SHA256 3d8370a8abe14d37cab5b1381619b85b8898dda30f98173158cacc68672bcbcc
SHA512 66612551bcaced332266db730df522c84c45b696fe3d867869f932a26af5f1a1c8fee372b7ae7fb248e727755c7f8d82ae6a9baf081d3e7b8ea034870134d889