Analysis
-
max time kernel
1841407s -
max time network
168s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
16-06-2022 18:20
Static task
static1
Behavioral task
behavioral1
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
-
Size
6.8MB
-
MD5
7a9a3c3c37885357227fb211984bbd40
-
SHA1
8046275ad75ef2bdbf1f21f6c64d36563d5b06f4
-
SHA256
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
SHA512
f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot Payload 2 IoCs
resource yara_rule behavioral2/memory/6027-0.dex family_flubot behavioral2/memory/6027-1.dex family_flubot -
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json 6027 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json 6027 com.tencent.mobileqq -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD560c429c92b31cf2056b6b34a23762e5b
SHA15ce0b38b8a52c47002d21e32a7ac0a01e4c561c0
SHA2565560970a6a5de549ccd9e28b851a5ee218449097b30e06529c6ea0fabd6f842a
SHA512951c2286ab0e2824ab0dc5d5b21a7bfd8a4880ba9b53b8bb59e73ab2edf6797abdbd429110b18d48d4335111ac538436e38376339ab1aa526eb849f16d6529df
-
Filesize
3.1MB
MD5ad8465c129549af17e79674174d034f0
SHA168d7f89e3f976b5ad66fcf9eb9b881259a41c8fb
SHA25641dd1e6416de4f990cfbc24ad3d9dc6bf830d2028adff42202bc5587fbf4c668
SHA51284f87c7f23c9e73d342ef5aca9bacf25dcce00d1b76c38d01b2678cf72c82689a62e41adfc77060d80e170ea8aece7022bc407c5f38065c7f4873f14de9df29e
-
Filesize
3.1MB
MD5ad8465c129549af17e79674174d034f0
SHA168d7f89e3f976b5ad66fcf9eb9b881259a41c8fb
SHA25641dd1e6416de4f990cfbc24ad3d9dc6bf830d2028adff42202bc5587fbf4c668
SHA51284f87c7f23c9e73d342ef5aca9bacf25dcce00d1b76c38d01b2678cf72c82689a62e41adfc77060d80e170ea8aece7022bc407c5f38065c7f4873f14de9df29e