Analysis
-
max time kernel
2991947s -
max time network
201s -
platform
android_x64 -
resource
android-x64 -
submitted
31-01-2022 22:47
Static task
static1
Behavioral task
behavioral1
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
Resource
android-x64-arm64
General
-
Target
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6.apk
-
Size
5.5MB
-
MD5
e57a895fcd7ac5579e7da4bab7e355b8
-
SHA1
9a992c72d8ba10b2e3350fff6a8d7e3a5955db54
-
SHA256
64364f6cf1b893a79d4acd1b54340e66483c8d9a8d354aac2cf4d3b88a6a8ad6
-
SHA512
6c4d57a11629ae86f9a22a7da265b2ef2644d7e690754d89e6bb573e469e315fbb20dd34d3d7bd7cb5628a001ab137103c9f617e84242588c1cc1e0c326bdbbd
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
resource yara_rule behavioral2/memory/3857-0.dex family_flubot -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.snda.wifilocating/jvvhh4nivl/ohwuiowvb5yhIgY/base.apk.hukhhhh1.Thk 3857 com.snda.wifilocating -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 icanhazip.com 31 ipinfo.io -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating