Analysis
-
max time kernel
1554028s -
max time network
167s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
26-11-2021 14:20
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail52.apk
Resource
android-x64-arm64
General
-
Target
Voicemail52.apk
-
Size
5.0MB
-
MD5
5e3fb4a6f144335016f5d0773b0113fd
-
SHA1
1a555e9e7f65ebe7ab2c6a48e126c63bb38e7612
-
SHA256
36158735c5442bb6a2f5432226403905551f360d7ce99fa51e9d2b54b7cd02e7
-
SHA512
cd0aeedac720253a5ef1afbdfdaed7c7db9efa13c3423c329a83917746ca9cdc968ab4c01f2ee07dac6093a497d6224c0849348ade75d51b635411bf280ad340
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre family_flubot -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.snda.wifilocatingdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.snda.wifilocating -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.snda.wifilocatingioc pid process /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre 4101 com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.snda.wifilocatingdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3231abf45dda8eabf4554dfca61af489
SHA102c74432bcc3b377578ccd9906a67bdf42f31bc1
SHA2560e8e17046fed1d67c50ab29ed8588f19747b466158b57816fde1a88cfcddd5ef
SHA512630427645277d5dfb700daa8cf7b38af0b0b34c5c13b011d41602be803e999f5ba29b58053d6083f2e583d9555f6a9e1808158cc207edfb38ed7ad8d2bddbc13