Analysis
-
max time kernel
1554028s -
max time network
167s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
26-11-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail52.apk
Resource
android-x64-arm64
android_x64
0 signatures
0 seconds
General
-
Target
Voicemail52.apk
-
Size
5.0MB
-
MD5
5e3fb4a6f144335016f5d0773b0113fd
-
SHA1
1a555e9e7f65ebe7ab2c6a48e126c63bb38e7612
-
SHA256
36158735c5442bb6a2f5432226403905551f360d7ce99fa51e9d2b54b7cd02e7
-
SHA512
cd0aeedac720253a5ef1afbdfdaed7c7db9efa13c3423c329a83917746ca9cdc968ab4c01f2ee07dac6093a497d6224c0849348ade75d51b635411bf280ad340
Score
10/10
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
resource yara_rule behavioral1/memory/4101-0.dex family_flubot -
Makes use of the framework's Accessibility service. 1 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.snda.wifilocating -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre 4101 com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating