Malware Analysis Report

2025-01-19 05:43

Sample ID 210915-xecbrsbbd7
Target 34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.zip
SHA256 665164cdc3f7c49f4bb8a6ba297014184523f742b2ad844db47b5354c78f1897
Tags
flubot banker infostealer obfuscation trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

665164cdc3f7c49f4bb8a6ba297014184523f742b2ad844db47b5354c78f1897

Threat Level: Known bad

The file 34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c.zip was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Requests enabling of the accessibility settings.

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-15 18:45

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-15 18:45

Reported

2021-09-15 19:07

Platform

android-x64-arm64

Max time kernel

3940256s

Max time network

1205s

Command Line

com.dailyyoga.cn

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.dailyyoga.cn

Network

Country Destination Domain Proto
US 1.1.1.1:853 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:853 tcp
NL 142.250.179.138:80 play.googleapis.com tcp
US 172.217.169.78:443 udp
US 142.251.36.8:443 tcp
US 216.239.35.12:123 time.android.com udp
US 1.1.1.1:853 tcp
NL 216.58.208.99:443 udp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp

Files

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/MultiDex.lock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/tmp-base.apk.classes7384877803860779478.zip

/data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip

MD5 fe87e5323fc5d40f23aa1955d4c5a37b
SHA1 38eb427ab9e25a1b3dbff0ce47ba9165b3b898a0
SHA256 3679c31a8555cf5a7d9c3fa7ed3c7fa6eb14cc03e72b20d6061c77379a52e054
SHA512 4c8d2526d50d60491b39aa29366d0df9bbeef1d14b2f4c4877d64fc0af7c745c1a1c5ba250f94ac924e18dc3960b5889116edcc29539f3b93cdb13754aa9fddd

/data/user/0/com.dailyyoga.cn/shared_prefs/multidex.version.xml

MD5 fa47e4f3e3f52b98537e2a9792de196b
SHA1 211c16e95f600eec1166e0481b202774e2ec82d1
SHA256 8ccb76e7b77242701a625c80f31ec64334d287e6911d8e8b12abc825e907cbdb
SHA512 ccb995677dd39c55b44dd29534b0decd45c9675659319f548de71dd21aa6528412d1ace039bb55d8bd6ce9a8d29f95de282284f0f9a7e68063dd18496e3936be

/data/user/0/com.dailyyoga.cn/shared_prefs/DHL Express Mobile.xml

MD5 fe866e3524562b90d1eb601cb905dd77
SHA1 05a9f61ab602824d4fe69006454befd56d495b41
SHA256 893fdcc64261aef367be90996336191b6c8a3b0d2b572048cbe8c305484cb2aa
SHA512 4ad254ddfb11ada85d58b96a5439067de05c0893926b420c4bd44b13b31addf9739a8fd8ec40e6f146242a2af97f1e37b6fe6c643352f5f54436c05752843908