Analysis

  • max time kernel
    1841269s
  • max time network
    158s
  • platform
    android_x86
  • resource
    android-x86-arm-20220310-en
  • submitted
    16-06-2022 18:18

General

  • Target

    a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk

  • Size

    5.0MB

  • MD5

    3a0db08d86d3d57edea7d52843f32761

  • SHA1

    1b24cb57faf69c2a955f1c10c911f1b16238a12c

  • SHA256

    a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b

  • SHA512

    5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 2 IoCs
  • Makes use of the framework's Accessibility service. 3 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Removes a system notification. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.iqiyi.i18n
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Removes a system notification.
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:5086
    • /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/oat/x86/base.apk.y8a7FeG1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:5173

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T

    Filesize

    2.0MB

    MD5

    f5e57e82ea5780959e6aaf565471ef48

    SHA1

    e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc

    SHA256

    95d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2

    SHA512

    4c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T

    Filesize

    2.0MB

    MD5

    f5e57e82ea5780959e6aaf565471ef48

    SHA1

    e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc

    SHA256

    95d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2

    SHA512

    4c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T.x86.flock

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/oat/x86/base.apk.y8a7FeG1.odex

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/oat/x86/base.apk.y8a7FeG1.vdex

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/riF8Gtgp.j6g7

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/tmp-base.apk.y8a7FeG3140970727921943597.j8T

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e