Analysis

  • max time kernel
    1842507s
  • max time network
    167s
  • platform
    android_x64
  • resource
    android-x64-20220310-en
  • submitted
    16-06-2022 18:39

General

  • Target

    Flubot49_2.apk

  • Size

    4.8MB

  • MD5

    c10d38a63e776e5940d281bddbb497d4

  • SHA1

    ac0561ee9acc38c138409d03a24bdd992a5b1d96

  • SHA256

    831334e1e49ec7a25375562688543ee75b2b3cc7352afc019856342def52476b

  • SHA512

    a9ddd9f1f370c0a15fc4f777ccd1bad8e2c3c6ad1236561fe8dc8e44690498e095fe86b755af68d43c14dc9a85cd0f9bbda452463e7dcad1e4bcdb2901ce3da5

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot Payload 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

Processes

  • com.qiyi.video
    1⤵
    • Loads dropped Dex/Jar
    PID:6345

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.qiyi.video/gJdedddiuw/dfhesukf9s8fjuj/base.apk.fvxfkd41.jn9

    Filesize

    2.2MB

    MD5

    7e079768ccb1b3921f7e5f259d628057

    SHA1

    1bd568284cc86cf8cb2fe7f769816116609d5c1a

    SHA256

    1f5d1129e95cac98b3f7baba1b0c8cee8aced5cc89730b4e066e703aec3233b8

    SHA512

    5d981ae7b2242d3077b91767b404912b244c5495a1a87b19a492f0731aed0a791377f7b66705a5e54eb25bf74655a536472ad293dcb0cb77f78d99b4c5b0a0dc

  • /data/user/0/com.qiyi.video/shared_prefs/multidex.version.xml

    Filesize

    306B

    MD5

    7e47f301cc2edd34b0ccf3140303b463

    SHA1

    ba995d0576f63feffbbd872a0c75336f6ee1455a

    SHA256

    d7ac91e0e4456bbb6d9bad6f82b6fbc3a00a8a7dcc3188caa28f7d251a6d758d

    SHA512

    78d72378c5cd9b9cecb6a122a4ee0652ee9505ba13f763eab33d9d608a4d600db9c1d3cb8be2a6e1091e06d4d049c5f036d404479ef13273e932b56df95cd700