Analysis
-
max time kernel
2512950s -
max time network
55s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
07-12-2021 16:43
Static task
static1
Behavioral task
behavioral1
Sample
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461.apk
-
Size
4.4MB
-
MD5
e4b7d12eca4451af72379738e8d425f1
-
SHA1
db43b7bec37baa08461a5ec1efec59d14479e5d9
-
SHA256
a2d3292bb87f8d6b3ce4b45d9ae6d61b4b7398770f732b72c881f43b66a49461
-
SHA512
a38d59569da4181c970d897f1d6dd22f588d43ad0e6190193fc5fb034104a740ebed585c684647f5ff1472602335ecd0a08580395230c147f96ede0cefcd50c3
Score
10/10
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 4 IoCs
resource yara_rule behavioral1/memory/4622-0.dex family_flubot behavioral1/memory/4622-1.dex family_flubot behavioral1/memory/4622-2.dex family_flubot behavioral1/memory/4622-3.dex family_flubot -
Loads dropped Dex/Jar 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.eg.android.AlipayGphone/app_apkprotector_dex/NIEyfzIv.ink 4622 com.eg.android.AlipayGphone /data/user/0/com.eg.android.AlipayGphone/app_apkprotector_dex/NIEyfzIv.ink 4622 com.eg.android.AlipayGphone /data/user/0/com.eg.android.AlipayGphone/app_apkprotector_dex/NIEyfzIv.ink 4622 com.eg.android.AlipayGphone /data/user/0/com.eg.android.AlipayGphone/app_apkprotector_dex/NIEyfzIv.ink 4622 com.eg.android.AlipayGphone -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.eg.android.AlipayGphone