Analysis
-
max time kernel
1842176s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
16-06-2022 18:33
Static task
static1
Behavioral task
behavioral1
Sample
Flubot_1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
Flubot_1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
Flubot_1.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
Flubot_1.apk
-
Size
5.0MB
-
MD5
5e3fb4a6f144335016f5d0773b0113fd
-
SHA1
1a555e9e7f65ebe7ab2c6a48e126c63bb38e7612
-
SHA256
36158735c5442bb6a2f5432226403905551f360d7ce99fa51e9d2b54b7cd02e7
-
SHA512
cd0aeedac720253a5ef1afbdfdaed7c7db9efa13c3423c329a83917746ca9cdc968ab4c01f2ee07dac6093a497d6224c0849348ade75d51b635411bf280ad340
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre family_flubot -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.snda.wifilocatingioc pid process /data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/base.apk.ki5fhf91.hre 6307 com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.snda.wifilocatingdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53231abf45dda8eabf4554dfca61af489
SHA102c74432bcc3b377578ccd9906a67bdf42f31bc1
SHA2560e8e17046fed1d67c50ab29ed8588f19747b466158b57816fde1a88cfcddd5ef
SHA512630427645277d5dfb700daa8cf7b38af0b0b34c5c13b011d41602be803e999f5ba29b58053d6083f2e583d9555f6a9e1808158cc207edfb38ed7ad8d2bddbc13
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
/data/user/0/com.snda.wifilocating/cJyl9g9uhh/udnb5JfccJukvhh/tmp-base.apk.ki5fhf97156056436191949888.hre
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e