Analysis

  • max time kernel
    1841272s
  • max time network
    166s
  • platform
    android_x64
  • resource
    android-x64-arm64-20220310-en
  • submitted
    16-06-2022 18:18

General

  • Target

    a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk

  • Size

    5.0MB

  • MD5

    3a0db08d86d3d57edea7d52843f32761

  • SHA1

    1b24cb57faf69c2a955f1c10c911f1b16238a12c

  • SHA256

    a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b

  • SHA512

    5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 2 IoCs
  • Makes use of the framework's Accessibility service. 3 IoCs
  • Loads dropped Dex/Jar 5 IoCs

    Runs executable file dropped to the device during analysis.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Removes a system notification. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.iqiyi.i18n
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Removes a system notification.
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:5833

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • /apex/com.android.art/javalib/core-oj.jar

    Filesize

    4.7MB

    MD5

    17bf082d9e9a6eb8b5d62d82f4af5476

    SHA1

    a401c7fbd8feea319dbcece5b4b3f6a254e71fb3

    SHA256

    4df590b764f65c16b51176ff394458d0b3a866ca75a4f912d6f76b7793043c1c

    SHA512

    f1a2673bf5c478176de0fceec8419434ab0606a14343c3b7fe1e2b181b0a2ff8f00c888ea1dcb8e711c4eb14aa1294919440adc63ce7735a67e93da21a0f7ae7

  • /apex/com.android.art/javalib/okhttp.jar

    Filesize

    395KB

    MD5

    2f737c10c13ddf1f3fe95054827891ca

    SHA1

    39233441365dbb7da364b4e75912f80e3b3abca5

    SHA256

    4214986fc39f65f743d77a4df6c79e12b969f173efc88ede281dd9b33c55d0df

    SHA512

    49907944fbc14692bba4587693cf2f9b1bbc9723b5e48fb641b6fde7f4cfe0f5813d3231d204a774fa3333ce7deb411fa0cbb33382e04bdc70791f4d9de436ba

  • /apex/com.android.conscrypt/javalib/conscrypt.jar

    Filesize

    429KB

    MD5

    ef9180f2d6baa6c7214403ec8f3b7ec5

    SHA1

    0da13630b0c13810bcea946dd88ec66774fcd502

    SHA256

    e56c2ca20f560f0c18610d592394f6aeae28a5838d03c7bcbcc5904a56b8e04b

    SHA512

    aa76abfe5d0d76ce1630d99b0b1ed133e782d30725169c9090529ac93c81251389a68153299013aa7a89af0d0430475d52310b7639ca048cb1cc516fa8ce879a

  • /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T

    Filesize

    2.0MB

    MD5

    f5e57e82ea5780959e6aaf565471ef48

    SHA1

    e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc

    SHA256

    95d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2

    SHA512

    4c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe

  • [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T]

    Filesize

    2.0MB

    MD5

    f5e57e82ea5780959e6aaf565471ef48

    SHA1

    e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc

    SHA256

    95d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2

    SHA512

    4c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe