Malware Analysis Report

2025-01-19 05:43

Sample ID 210913-lblv9ageap
Target DHL98.apk
SHA256 34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c
Tags
flubot banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c

Threat Level: Known bad

The file DHL98.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-13 09:21

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-13 09:21

Reported

2021-09-13 09:24

Platform

android-x86-arm

Max time kernel

3732440s

Command Line

com.dailyyoga.cn

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A
N/A /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.dailyyoga.cn

com.dailyyoga.cn

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/tmp-base.apk.classes1860224919841938481.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/oat/x86/base.apk.classes1.vdex

MD5 4702179a4588d227c358b65dd4bf3cc8
SHA1 be0fdd9aa88e4ced618291187e4cdf734e585f7d
SHA256 a8dacabf6a21ffe7d0a6fb88d079917185217d0bb2e235bce62aa5717abe3014
SHA512 b1f79787135259321014e16a94ae567ebec48c18b34d1c0fa5e453fd47cc5b43c3b418ee1727e3f7444ec78551c22ce647705f011b25afd61b6bb548c4245899

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex

MD5 efe18b13034e14d0200cc0f3b1848687
SHA1 9376ad7c2597aaa89de14dc640bf47130b9af910
SHA256 4301011e1c37c9c47040b39c85a1fc0ee1f9816059cce421e057adf07e9b8aac
SHA512 21e6aec33d63f5f7d54bf8721b30965dad78ae410e9c2bfa6d051571de23a56150c0159c39104df73a20cabee487623eab5fe1010376d5b73dd35b862f6975fc

/data/user/0/com.dailyyoga.cn/shared_prefs/multidex.version.xml

MD5 0ba981275742937ec06f47c2fdcdef2f
SHA1 f1c40b382cabb97030845b83beb71763d4bc6d9a
SHA256 198d50c3ae0c288cb91b34886a4d39773442e05600945064adf640f909683bb4
SHA512 95f4b14967cb5c7c84ff6d30d9243bec4864f702797ef26341d49c3aac6011a1bc9d44c03a83ead1aa4ec07a8d37dfdbc8c4e09c67b104153392030cb5086461

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/shared_prefs/DHL Express Mobile.xml

MD5 5a4cbe0f38eebe0e9071d574101a3720
SHA1 32e0921ae32dba10bbf13a6750cfc6ca51ca648a
SHA256 62daaf7229bbb8606ece63b9b80f896257488e23663c993fdcfa72cc794c22f6
SHA512 f07ccb06fe8e9ae13683a4d6bcd1337f6c41b20a8abe46ec533b0d739d519d875eb8497024ec3205edfabfca06d133ec1c24d8a361951f12b5fec1567c80431f

Analysis: behavioral2

Detonation Overview

Submitted

2021-09-13 09:21

Reported

2021-09-13 09:24

Platform

android-x64

Max time kernel

3732435s

Max time network

49s

Command Line

com.dailyyoga.cn

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.dailyyoga.cn

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.8:123 time.android.com udp
US 172.217.168.202:80 play.googleapis.com tcp

Files

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/tmp-base.apk.classes1481097613172183649.zip

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 fe87e5323fc5d40f23aa1955d4c5a37b
SHA1 38eb427ab9e25a1b3dbff0ce47ba9165b3b898a0
SHA256 3679c31a8555cf5a7d9c3fa7ed3c7fa6eb14cc03e72b20d6061c77379a52e054
SHA512 4c8d2526d50d60491b39aa29366d0df9bbeef1d14b2f4c4877d64fc0af7c745c1a1c5ba250f94ac924e18dc3960b5889116edcc29539f3b93cdb13754aa9fddd

/data/user/0/com.dailyyoga.cn/shared_prefs/multidex.version.xml

MD5 c13ac8bb899b761605e1cea7c7302c37
SHA1 634c96c63c6cd92064664fac2b28ad868a995b11
SHA256 8ff772ccbae7800edf2fa1e5a20e1734901e9274a8e7bf06653e3466cbae58c8
SHA512 3f973a9785d930855d5a8995475d35d6793dd26becd8c8da2d803e671d0fcf1c57c2f2a6738e2f1ede308a9dfacc4f69fb8a55e36eee7b4e049c911e2c95d2aa

/data/user/0/com.dailyyoga.cn/shared_prefs/DHL Express Mobile.xml

MD5 4a425762bca60c03f5a915056c79f6ba
SHA1 85b86915e8e2ea342754448548fb384b0e517f2b
SHA256 7713df9eb7bd3bfcee6ed3193432c1f8a53820ec4a57d223eb9bec09c3dbbbd1
SHA512 840ad9e0b7ddd2974f3e48a961404e451772156318be96741507fb202a5d12e504a65221b0c6f1cbe7e978a0e169c6d5972bcc0d2297f45674fe6cbf708d0f8f