Analysis
-
max time kernel
2240842s -
max time network
163s -
platform
android_x64 -
resource
android-x64-20220310-en -
submitted
21-06-2022 09:18
Static task
static1
Behavioral task
behavioral1
Sample
6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1.apk
-
Size
3.4MB
-
MD5
c9ddaa4d670c262bf2621b8299ccf84e
-
SHA1
8773fe52563b9aa22909e53671d99d1277427f87
-
SHA256
6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1
-
SHA512
786e56c8011f179f96b489b7ad8f97185194ae3221f108ca5badb6aef3007d2f54ab3dd3ac4c43290b8dca0cfacb9d4387c7dd8099823a4fdf1b54069abd77f9
Malware Config
Signatures
-
Malibot payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/6367-0.dex family_malibot -
malibot
Malibot is an Android banking malware with the ability to bypass 2FA/MFA codes.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.wjyfqwzhu.fbqipukbmioc pid Process /data/user/0/com.wjyfqwzhu.fbqipukbm/GFqufipowG/8gG8oI6y8gkhugg/base.apk.j6jU8Ug1.gdf 6367 com.wjyfqwzhu.fbqipukbm
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
495KB
MD5bc97bcf8dd4f7a5a6bf5ff093cad5f37
SHA1026e094dee541cd465d0e07b32ccdfd6b1f85cb7
SHA2564cae15ba01d4a21bcd4ce7a390cd58fd8a325c19ee9069adcc474b97d186535e
SHA5127373f5c72e9135c70f57db86e940b28e95e51cf57ecb34fe6b5ebf9b8328bec122c3c1d88635906e6c519afaeb3c276d9b3f6a4d50fe018c7a8f83e053f29dcc
-
/data/user/0/com.wjyfqwzhu.fbqipukbm/GFqufipowG/8gG8oI6y8gkhugg/tmp-base.apk.j6jU8Ug8061803901721079977.gdf
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
307B
MD560fc07cd23b2ff5af9446ebc551c5f21
SHA1c7ae4360541c9abdaf5a928337abf2d854bb63e9
SHA25640652b7c2e50ac34bf147a328bfb69df0360c367465d71e5269927c00bc5ea99
SHA512c4934255c585f08789e06e4654c8df674dbb62c1856847b49f193d44e7ee4702b754dd8086d5b1e60518e0332777f63983a901a3727fea3c9ef8c39a5966e064