Analysis
-
max time kernel
848361s -
max time network
164s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
12-09-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
16427dc764ddd03c890ccafa61121597ef663cba3e3a58fc6904daf644467a7c.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
16427dc764ddd03c890ccafa61121597ef663cba3e3a58fc6904daf644467a7c.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
16427dc764ddd03c890ccafa61121597ef663cba3e3a58fc6904daf644467a7c.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
16427dc764ddd03c890ccafa61121597ef663cba3e3a58fc6904daf644467a7c.apk
-
Size
5.4MB
-
MD5
098b5ec115662385d761042806d85492
-
SHA1
a66cf97d9458f7c3b568f801a99f54f9bde14efe
-
SHA256
16427dc764ddd03c890ccafa61121597ef663cba3e3a58fc6904daf644467a7c
-
SHA512
898bb420badffdfeba358dd290dba02238b7acf166080b55a8189c76f532865878ccf8fc4f02ae542469eef2d80414f9fbfd2e7fe9280ff1c26c0a875cc8b918
-
SSDEEP
98304:Bg3vvJeZDDJkZlLbgOQ0vUMO01QfEuhd5YJ7Efhm1dSScc0uDObtPxK:G3HJq3S1Q0MMTyhd5wNbSPcebtU
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/dI8Gewhjhf/6jghjGtqgfTgItH/base.apk.8dejHg61.gyg family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mobileqq -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/dI8Gewhjhf/6jghjGtqgfTgItH/base.apk.8dejHg61.gyg 4298 com.tencent.mobileqq -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mobileqq -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 52 api64.ipify.org 53 api64.ipify.org -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mobileqq -
Removes a system notification. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.tencent.mobileqq -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
-
com.tencent.mobileqq1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4298
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5ff4a28a91c63039a7a6ea1ee9f958e70
SHA1bdaeffce5a25686164d3d2d0469ca2000d8bca3f
SHA256ea4107eb9315c9ec499485e299519de74b2d5815f96a74603364b3434e576109
SHA51277eae92b130a9e4b78de3082237e22a1a5e1d8f390b2f29e273a6771942e722d5e0fd6566144814727846c83e97f7df6caf93b7c17382507e7c875e7c4399de3
-
/data/user/0/com.tencent.mobileqq/dI8Gewhjhf/6jghjGtqgfTgItH/tmp-base.apk.8dejHg66683472357922573330.gyg
MD5d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
133B
MD5e496d4dfaa3b6c5720cd4339c98c9be3
SHA14f41b7c7aa258e013c13f6de0a15c9cb1884fbf9
SHA2563ee69bf90b4e8bd7f7049f4d05c5e713745dad6f0e29ad19d49b8ed2c2ba455b
SHA5127c370645868ed13e4fdb5d2620df341f0b888a81d2c0660ce91026fc27aeedde85fd25d23874cc8eb82bef17da0e0e3de825eb5dd478a98bc2cb1f45f70457de
-
Filesize
176B
MD55ce521696ed77dac9d5e36032bfdb09a
SHA1e438f5855f53dd9dbec77db8512fcab9da43b355
SHA2568f6d41949c8c78fca53cb0d0a41169874e0366ba47b24b305dedd0c4116949f1
SHA512f4e9589aeac79b8e2184792ba82b4e3296aa1fc0f7def99b35cd21fc6f5e7e9b798aa222305921a2c5f07fa18ed16c7dce8c47654a96ac1f7ef3a1c8762182d6
-
Filesize
240B
MD55eba66ab7f67a49443a6e536d3860c5b
SHA148ea2418d3f535d60cb1e679e4d6aa2999b447ee
SHA256a5c8ee4a6b1e7949d0fbfa75da764d1bb4b38a03e096b3b183b4b9f8739d5f1e
SHA512c0bd877c20f17d21089be498ccdc940669eb27e33202888c154a95ad1081dfb808280744d00e86671c1d6aea7868d65008f82d29243a1c65b34741405a2949e5