Resubmissions

14-02-2022 15:46

220214-s7ym9ahgd5 10

14-02-2022 15:42

220214-s5e35abcbn 10

01-02-2022 23:08

220201-24xffscfer 10

01-02-2022 22:53

220201-2t9m2acha7 10

01-02-2022 12:27

220201-pm286ababm 10

31-01-2022 12:44

220131-pygrlahbeq 7

31-01-2022 12:24

220131-pk6hsshbdj 10

19-01-2022 11:27

220119-nkj45ahcg6 10

Analysis

  • max time kernel
    1914244s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64
  • submitted
    19-01-2022 11:27

General

  • Target

    06371fc75740162de9e6275102012e6c.apk

  • Size

    6.0MB

  • MD5

    06371fc75740162de9e6275102012e6c

  • SHA1

    9b45243e89541ae26fea5ff2b9c7d14ff69044ed

  • SHA256

    4859ab9cd5efbe0d4f63799126110d744a42eff057fa22ff1bd11cb59b49608c

  • SHA512

    c865d89143effb176c4be93fc16f54e06d248f5b7e22ffbf19754137f9da181f6d7f6019cdb28d2d7964375b1978a255c475dd3d17487fddb9fa0e4eda8bf248

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.tencent.mobileqq
    1⤵
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:3801

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tencent.mobileqq/eGGggUk6i7/GI8kghfhhThU88f/base.apk.eUftgIu1.jjI
    MD5

    50047ec0209d69081cbd555b6c385a49

    SHA1

    98175443858a4f2998719a02e3446d610e7157ed

    SHA256

    b1951dfd1028e85d5f62f6d5337bc9132625d4c3f972a4050e15f50daac18c2c

    SHA512

    58a3b30b6a9315ef775bafe977b03b6e9771d764561de7c225c881b5c83d3551cd67408a2ad35504a7eb729c66c3af7158abdb18fb54df17d7a6c1fd6ebd539a