General

  • Target

    DHLlApp.apk

  • Size

    4.6MB

  • Sample

    220213-wn1kaabec8

  • MD5

    f8c592e8c5e0f0d6fe063479fe91c86d

  • SHA1

    592b1965ff2605c18ea90144ad47be5d527cf98f

  • SHA256

    40b548fb37f7d9dbba820c450c3ff02bc2745d269e3e1192c692d32e5512c161

  • SHA512

    398f0259c4d8048605deb65557844791418c3a9ada7f7bafb99e83868a8ccacef87217f9eba1f329ef6ea055ae870dba584e1af99b622d3279c2664580f2a208

Malware Config

Targets

    • Target

      DHLlApp.apk

    • Size

      4.6MB

    • MD5

      f8c592e8c5e0f0d6fe063479fe91c86d

    • SHA1

      592b1965ff2605c18ea90144ad47be5d527cf98f

    • SHA256

      40b548fb37f7d9dbba820c450c3ff02bc2745d269e3e1192c692d32e5512c161

    • SHA512

      398f0259c4d8048605deb65557844791418c3a9ada7f7bafb99e83868a8ccacef87217f9eba1f329ef6ea055ae870dba584e1af99b622d3279c2664580f2a208

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks