Analysis
-
max time kernel
754111s -
max time network
128s -
platform
android_x64 -
resource
android-x64 -
submitted
24-02-2022 18:14
Static task
static1
Behavioral task
behavioral1
Sample
eabe4a.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
eabe4a.apk
-
Size
4.8MB
-
MD5
3c27c60e3677c0f86760a765701eaf82
-
SHA1
f67a47fb399acf2a4efabf551687023d09481f4d
-
SHA256
eabe4aef231ac85bbbd2e085d7cbe993d1aa66eddd75289c829a4d17ed2b500a
-
SHA512
c5d751c829f3840db12ad5b5f7153882cc7cc8b5af677e40ea7326d8c65d7d247fa639775a55fc2feeca7de1c6d460df0424b2ea4bb18b7230288949c4044108
Score
10/10
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
resource yara_rule behavioral1/memory/3803-0.dex family_flubot -
Checks Qemu related system properties. 1 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
description ioc Process Accessed system property key: qemu.gles com.tencent.mobileqq -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mobileqq/rgwffIjgHu/q8ajgjG8UI7yGUU/base.apk.tufG88y1.j7s 3803 com.tencent.mobileqq -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq