General

  • Target

    UPSqMobile.apk

  • Size

    4.4MB

  • Sample

    220305-r61wjsacal

  • MD5

    307fabdd1b1753af2639883710eb0fe6

  • SHA1

    cc5b8daf2db45d090273d955c4e1b7e3c7d29ac1

  • SHA256

    fecff07d99e6435ac7d7f2841260156ea121da4dc623467e3cc80a7afa5c68c2

  • SHA512

    ad53d4a61c7bfc77b6dd359e7775c487c8854518bb5fec0541d98404cb69c4c8b2f542b52e8dbb1e3d71afeb69fa3aac5448bd682f57d8bd72a22485102dcbfd

Malware Config

Targets

    • Target

      UPSqMobile.apk

    • Size

      4.4MB

    • MD5

      307fabdd1b1753af2639883710eb0fe6

    • SHA1

      cc5b8daf2db45d090273d955c4e1b7e3c7d29ac1

    • SHA256

      fecff07d99e6435ac7d7f2841260156ea121da4dc623467e3cc80a7afa5c68c2

    • SHA512

      ad53d4a61c7bfc77b6dd359e7775c487c8854518bb5fec0541d98404cb69c4c8b2f542b52e8dbb1e3d71afeb69fa3aac5448bd682f57d8bd72a22485102dcbfd

    • FluBot

      FluBot is an android banking trojan that uses overlays.

    • FluBot Payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Checks Qemu related system properties.

      Checks for Android system properties related to Qemu for Emulator detection.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks