Analysis

  • max time kernel
    1737147s
  • max time network
    126s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    15/06/2022, 13:23

General

  • Target

    831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b.apk

  • Size

    4.8MB

  • MD5

    c10d38a63e776e5940d281bddbb497d4

  • SHA1

    ac0561ee9acc38c138409d03a24bdd992a5b1d96

  • SHA256

    831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b

  • SHA512

    a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.qiyi.video
    1⤵
    • Loads dropped Dex/Jar
    PID:6185

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.qiyi.video/gJdedddiuw/dfhesukf9s8fjuj/base.apk.fvxfkd41.jn9

    Filesize

    2.2MB

    MD5

    7e079768ccb1b3921f7e5f259d628057

    SHA1

    1bd568284cc86cf8cb2fe7f769816116609d5c1a

    SHA256

    1f5d1129e95cac98b3f7baba1b0c8cee8aced5cc89730b4e066e703aec3233b8

    SHA512

    5d981ae7b2242d3077b91767b404912b244c5495a1a87b19a492f0731aed0a791377f7b66705a5e54eb25bf74655a536472ad293dcb0cb77f78d99b4c5b0a0dc

  • /data/user/0/com.qiyi.video/shared_prefs/multidex.version.xml

    Filesize

    306B

    MD5

    7554c899ccb7c91d0c571f0659b9d3ba

    SHA1

    6e6a0c63aeabac480e31d33076dddc07da62a324

    SHA256

    a22e3dbfa0b9c77b9e926d8fea769967f7ef503e8361ba04596cf07cdc0a4b87

    SHA512

    db804cc67a52a81343073c40d8ad5713877eddd5d1b1ec3bbb4b9903ec099c48e3cf8f4435245753fa8021ccfcc4da7c1b9a397983a3ba7631b88820fe3c626a