Analysis
-
max time kernel
380647s -
max time network
165s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
26-10-2022 23:31
Static task
static1
Behavioral task
behavioral1
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7.apk
-
Size
4.1MB
-
MD5
3acf9f6b6a813d018d643263766f06b5
-
SHA1
10bfc1b6b540b56386c335bff1399f20f63eafc9
-
SHA256
7c92b5617af4da664343684530e88639e0624f21c53a2cadc61a1e6a57fc29d7
-
SHA512
db814c7c68e3b837954e3f662e1874e7909b1eca3e008ed789c91ecfceaea6f2e403d9388602f5459b043879392bdf03774bb70d6e862515f230ea9bbb8a3f96
-
SSDEEP
98304:Gw1nfyCcWUCIFy7TEWhMOvKRhMD7h3UXrtQKDEqMn:G2nRVxA0zOOdD7VwrtPIqMn
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 4 IoCs
Processes:
resource yara_rule /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc family_flubot /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc family_flubot /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc family_flubot /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.bilibili.app.indescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bilibili.app.in Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bilibili.app.in Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bilibili.app.in -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.bilibili.app.in/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/98jrUhjf.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc 4069 com.bilibili.app.in /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc 4174 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/98jrUhjf.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc 4069 com.bilibili.app.in -
Removes a system notification. 1 IoCs
Processes:
com.bilibili.app.indescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.bilibili.app.in -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.bilibili.app.indescription ioc process Framework API call javax.crypto.Cipher.doFinal com.bilibili.app.in
Processes
-
com.bilibili.app.in1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4069 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/98jrUhjf.doc --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bilibili.app.in/app_apkprotector_dex/oat/x86/98jrUhjf.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4174
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD5ea3531805c0577d24c0fb6797808e41e
SHA1db0318d2b6d223fcfbbdeafb6ed62f6a26ffca5f
SHA2562df449e734c6220d13fc3a9f26db497df413cd593675b6ee51ba95935c8e60b4
SHA5126f560c00e813b287078300f4a52dc3f076052dceb920021f3ae1dd25d5048064ab956160a870ca732b0475beccd0f18bd536a78f645f23072c43fc3687ccc0ba
-
Filesize
4.7MB
MD5ea3531805c0577d24c0fb6797808e41e
SHA1db0318d2b6d223fcfbbdeafb6ed62f6a26ffca5f
SHA2562df449e734c6220d13fc3a9f26db497df413cd593675b6ee51ba95935c8e60b4
SHA5126f560c00e813b287078300f4a52dc3f076052dceb920021f3ae1dd25d5048064ab956160a870ca732b0475beccd0f18bd536a78f645f23072c43fc3687ccc0ba
-
Filesize
4.7MB
MD5320123a85dfd7998382e6979e93f379d
SHA165ac2b5c6ad3161e86271bc8db378284c89bc970
SHA256da0422c420b760c40cd338ceb76462cae436563f59255cd0dbb977d8620acfab
SHA512065c900d3879b4fa55e88ae3518bde1231f63ecda21c7f5cc6c4e962e3d6d6825cc0100fe210b7c9dab42e69f146970f9abc06cc17c730868ec87d03abbca611
-
Filesize
4.7MB
MD5ea3531805c0577d24c0fb6797808e41e
SHA1db0318d2b6d223fcfbbdeafb6ed62f6a26ffca5f
SHA2562df449e734c6220d13fc3a9f26db497df413cd593675b6ee51ba95935c8e60b4
SHA5126f560c00e813b287078300f4a52dc3f076052dceb920021f3ae1dd25d5048064ab956160a870ca732b0475beccd0f18bd536a78f645f23072c43fc3687ccc0ba
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
133B
MD5a79f7aa8a3badf5fc0bababbf2299fe9
SHA152f647899c9881451f59bc214dfa61c9c373766a
SHA256200f2922225dd4cc10a73aa00f5f1c6572b4c8ab490e6a4ddfcc5dd66b5cd49e
SHA512cfc1d03628e7845e845556669e5f864a2527fcbd08d8092124756b8d0528b6e26afa4907ecc2b37167bea2c7858c67508f2f6e4bbb85de4f9ae39a2b01e552db
-
Filesize
197B
MD506487a77dd4d2f72e2ea1a7d1d68efec
SHA1a62b3b4f13070c0dd10d2b7a6348df2ad9d4c4c0
SHA256e06737baf62a5e4af53a32898754ac1d2ffdd560b8a2942aa1fe52aac6311dbf
SHA5121593b2f9631bf1f7f202036112f947897bf7a956964fbd48ca6e2f9f6e28090a0096781cb3f3a9c184a3f9ad9a1d4f557feb9bc3e2952b83dc3f04df5c254ac8