Analysis

  • max time kernel
    1840891s
  • max time network
    161s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    16-06-2022 18:12

General

  • Target

    c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763a.apk

  • Size

    3.8MB

  • MD5

    c136b8d59db8d91ec022aa0151028e05

  • SHA1

    9eae5b7351e1cfb35d67a78d441b9c612dce491f

  • SHA256

    c22c7b1f473939ebaa1ae8f891065633a767a4ad84b804e1c61faa7d8ad22763

  • SHA512

    34b0c0947f321ba8b785ed36412bbc7a59c77438962afaf0d67179232e36ab7c1d885c9f83e0384900c0c1723249f29cd8fc7548423ff647a01678d349b08fe3

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.iqiyi.i18n
    1⤵
    • Loads dropped Dex/Jar
    PID:6218

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.iqiyi.i18n/code_cache/secondary-dexes/base.apk.classes1.zip

    Filesize

    2.4MB

    MD5

    97dda0e8d28f6defb1950d05e650b4b4

    SHA1

    9883c2bf6cba5d1b46fcba54baf01342f2adb7a1

    SHA256

    2a7d1f5b88741377488ac0bf0c22b81573803a7729738c3a7dc081fefcb88c7d

    SHA512

    7b7c75790dc77ac71f3b9bfbfea4bd48cddb03347d6ce33cb1266a3b1af0e9759249c800b57f084353fa6a9ecc41c90149060a0e3cb8136b801cab6743219127

  • /data/user/0/com.iqiyi.i18n/shared_prefs/multidex.version.xml

    Filesize

    307B

    MD5

    c3ddb224d7f4f73a4831d23308bdd318

    SHA1

    15ac3e6ccfeba97d47f5fd17657711cd5c85eca5

    SHA256

    6652984210f840d4d8d3999c9776f401fc77b4661a609992c48f14b7ae258bda

    SHA512

    86e0ea5848a45c45863d8e20c9fbae8108847ae4877cab3cb531a916d4e08d9a5e912c49fcde30185dad4e3ad7814d728d1aa383b03ab27947bf297c67442388