Malware Analysis Report

2025-01-19 05:41

Sample ID 210915-hk6p8sdafm
Target 1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b.apk
SHA256 1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b
Tags
flubot banker infostealer obfuscation ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b

Threat Level: Known bad

The file 1b0bfad146eeb4295c3a1ee5b316adea4b1195bf35006b038d8d6d21d8310e5b.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation ransomware trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses Crypto APIs (Might try to encrypt user data).

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-15 06:48

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-15 06:48

Reported

2021-09-15 06:50

Platform

android-x64

Max time kernel

3896013s

Max time network

20s

Command Line

com.sina.weibo

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.sina.weibo/app_apkprotector_dex/Y1VjHmUP.sq N/A N/A
N/A /data/user/0/com.sina.weibo/app_apkprotector_dex/Y1VjHmUP.sq N/A N/A

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.sina.weibo

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
US 216.239.35.12:123 time.android.com udp

Files

/data/user/0/com.sina.weibo/app_apkprotector_dex/Y1VjHmUP.sq

MD5 f5561a08e87f709dd3d811efd2bbd93a
SHA1 893de96ccede79d024da230d3159145723860690
SHA256 d4b54261bbbfdb8bb5ac3fc1a44b88b95781ee603a8b4f89c1a09d0773083e43
SHA512 fb68a489cc5826a255a623849419f477c6988295b5cf4a220e4bbae463bcb19cc19cad84bf3edc91f699c8fcaa98fbefff2918c037dea36a64c27b52b045b48c

/data/user/0/com.sina.weibo/app_apkprotector_dex/Y1VjHmUP.sq

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.sina.weibo/app_apkprotector_dex/Y1VjHmUP.sq

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.sina.weibo/shared_prefs/Voicemail.xml

MD5 9ab59f3f0b3adf38d5614453f39b29f1
SHA1 f5a8f075c94277532987ab9292f9a8681c0513e6
SHA256 8094abe8c1bc9faeaba22afa047c31f67a75e188469cff0fa7dea61b524e8523
SHA512 5cce16ee77b4e24b824006fb745a72a2974d6e3a428fcac897a35220b6a213da674150b71b8e818918b1781d5d1e4f91ed9c34430acc77b291391e0d53dbebc0