Malware Analysis Report

2025-01-19 05:41

Sample ID 210920-pk65bsggbp
Target 72e7df1b02eb67ac2ff1a4d96f1c16e332f5eb593e0f03c9f19bfe777a6d1faf.apk
SHA256 72e7df1b02eb67ac2ff1a4d96f1c16e332f5eb593e0f03c9f19bfe777a6d1faf
Tags
flubot banker infostealer obfuscation ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

72e7df1b02eb67ac2ff1a4d96f1c16e332f5eb593e0f03c9f19bfe777a6d1faf

Threat Level: Known bad

The file 72e7df1b02eb67ac2ff1a4d96f1c16e332f5eb593e0f03c9f19bfe777a6d1faf.apk was found to be: Known bad.

Malicious Activity Summary

flubot banker infostealer obfuscation ransomware trojan

FluBot

FluBot Payload

Requests dangerous framework permissions

Loads dropped Dex/Jar

Uses Crypto APIs (Might try to encrypt user data).

Uses reflection

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-09-20 12:24

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-09-20 12:24

Reported

2021-09-20 12:30

Platform

android-x86-arm

Max time kernel

53466s

Command Line

com.bilibili.app.in

Signatures

FluBot

banker trojan infostealer flubot

FluBot Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png N/A N/A
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png N/A N/A
N/A /data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png N/A N/A

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Uses reflection

obfuscation
Description Indicator Process Target
Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows N/A N/A N/A

Processes

com.bilibili.app.in

com.bilibili.app.in

/system/bin/dex2oat

Network

N/A

Files

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png

MD5 00ae391e5e3ee7e7bda31cbd463b24db
SHA1 50d6f8af6fa61366d1cc01a268243904ba700015
SHA256 ce1f86d8dc972f7bc3226bb5790c0dfd9d77d0607f6635ae7254fbfc6446810a
SHA512 49d0e8215c2d8cdfef4b8ae50e3e4ee66159480dc739e7a1ff73e7da94e2265b080cce3c74f183bf904cec323b9b2ec27bdc139400f6ffdf27930b0f6c7f5095

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png.x86.flock

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/q6JJYc0R.vdex

MD5 800fceaa71bdea439c845b3a923c97bc
SHA1 f5b44715097de11c5e1d089cdc084bc3c424ae65
SHA256 7c74b4494a40967b4869248bc6ca20a3acd1b0e059e94ebbc705e32d5b0fec03
SHA512 8fba08a7e7b7cd5f4124dcf043eb573f5c0c4c01cea43456bc5ba51e271911c421cb9a8ed53a4af6452b059cc82dacaf9664e56b94cbe0b19c6529b943fdb686

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/q6JJYc0R.odex

MD5 5bb91d6877596b16521281546c060feb
SHA1 2ea1437ed334dea3bd5c6af472853121d8526e1e
SHA256 f6399dd5ab68f3fc7e20b0431a5ff2b10b9132d5d0550c596be0dd18bed81c1e
SHA512 2a1d3ea95275b4eb225da47af24ed29897defd83416b7a486789cf313e13ec52c545fe271230ed765d7e93868b9a54a196f644d15128cfa2abc8cededb0c6e4c

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/app_apkprotector_dex/q6JJYc0R.png

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

/data/user/0/com.bilibili.app.in/shared_prefs/Voicemail.xml

MD5 b692f444af38eed475bfc8acc1bc1753
SHA1 9a962fc2d008a3d4141ff589f7130e8f396afd6a
SHA256 6fde96ecde933b5e8645722c01a883cef064897863b9fd88f355f459d9aabccf
SHA512 818f4ddeb11984648215d569721464b2725c06a7fe243e985f395c3bf5ad424c3ecee641524fd5bd3310ad2f9ef02302d2b5f272617d08765c92cadcefcaa173