Analysis
-
max time kernel
1841272s -
max time network
166s -
platform
android_x64 -
resource
android-x64-arm64-20220310-en -
submitted
16-06-2022 18:18
Static task
static1
Behavioral task
behavioral1
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
-
Size
5.0MB
-
MD5
3a0db08d86d3d57edea7d52843f32761
-
SHA1
1b24cb57faf69c2a955f1c10c911f1b16238a12c
-
SHA256
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b
-
SHA512
5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 2 IoCs
resource yara_rule behavioral3/memory/5833-0.dex family_flubot behavioral3/memory/5833-3.dex family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.iqiyi.i18n -
Loads dropped Dex/Jar 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T 5833 com.iqiyi.i18n /apex/com.android.conscrypt/javalib/conscrypt.jar 5833 com.iqiyi.i18n /apex/com.android.art/javalib/okhttp.jar 5833 com.iqiyi.i18n [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T] 5833 com.iqiyi.i18n /apex/com.android.art/javalib/core-oj.jar 5833 com.iqiyi.i18n -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 icanhazip.com -
Removes a system notification. 1 IoCs
description ioc Process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.iqiyi.i18n -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.iqiyi.i18n
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD517bf082d9e9a6eb8b5d62d82f4af5476
SHA1a401c7fbd8feea319dbcece5b4b3f6a254e71fb3
SHA2564df590b764f65c16b51176ff394458d0b3a866ca75a4f912d6f76b7793043c1c
SHA512f1a2673bf5c478176de0fceec8419434ab0606a14343c3b7fe1e2b181b0a2ff8f00c888ea1dcb8e711c4eb14aa1294919440adc63ce7735a67e93da21a0f7ae7
-
Filesize
395KB
MD52f737c10c13ddf1f3fe95054827891ca
SHA139233441365dbb7da364b4e75912f80e3b3abca5
SHA2564214986fc39f65f743d77a4df6c79e12b969f173efc88ede281dd9b33c55d0df
SHA51249907944fbc14692bba4587693cf2f9b1bbc9723b5e48fb641b6fde7f4cfe0f5813d3231d204a774fa3333ce7deb411fa0cbb33382e04bdc70791f4d9de436ba
-
Filesize
429KB
MD5ef9180f2d6baa6c7214403ec8f3b7ec5
SHA10da13630b0c13810bcea946dd88ec66774fcd502
SHA256e56c2ca20f560f0c18610d592394f6aeae28a5838d03c7bcbcc5904a56b8e04b
SHA512aa76abfe5d0d76ce1630d99b0b1ed133e782d30725169c9090529ac93c81251389a68153299013aa7a89af0d0430475d52310b7639ca048cb1cc516fa8ce879a
-
Filesize
2.0MB
MD5f5e57e82ea5780959e6aaf565471ef48
SHA1e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc
SHA25695d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2
SHA5124c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T]
Filesize2.0MB
MD5f5e57e82ea5780959e6aaf565471ef48
SHA1e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc
SHA25695d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2
SHA5124c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe