Analysis
-
max time kernel
381613s -
max time network
612s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
26-10-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
-
Size
4.0MB
-
MD5
2ffac6c6ba63598b34dc8a076208f7b4
-
SHA1
02d20c723835a961b594ada5c5acff8ee5ed9bab
-
SHA256
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
SHA512
fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8
-
SSDEEP
98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 4 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.tencent.mmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mm/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mm/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4137 com.tencent.mm /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4255 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mm/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4137 com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mmdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:4137 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mm/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4255
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
Filesize
3.1MB
MD5be4a01c50b0abbabbdcbb8b549f43a2a
SHA1c50a9b8ae100bdf1698852e0e5ac5ed3976c752d
SHA25624779aa5e7b19568d23938c0cecb74cce7f08dd7190ff602d788af241409a1b4
SHA512baafabf7b1261f0767bf0f87d411e470c758db7a243668ac00f45ae315158a239b07bc24849ad04de62034a5f6da0eeddaf93c1621bb31d2d34047d9cad82274
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
133B
MD5c60598bb42124f48e2fc3fb48c52fcd7
SHA1a282d85bd60fa95ef35d7b547d6c82d6ad67a9c9
SHA256d3e829f27a94ddaf763eac63250480e08fcf0d1257daedeea6513f7c90b0df48
SHA5122b936e9eceb6b50f00c75a1831ba7233170ddb81ab9a04b86e9833bc12364f621d20e64d7d4cd5935530d4b55a88091b3429c15171252902be1a57cdd04cbf45
-
Filesize
197B
MD5743053d7d5db31b6970b541da62f642d
SHA1fa6de0dee7b68f423f9993ae05c152874d307554
SHA25605d0fa401b84c0827f5a881cf9b5614c56a4af90c8b36da544de183d6bd1d7af
SHA5129443242316d8a27f70b4f8ad6c8138d61c0c6628d50526a440b91c843da83e9a4a42a05ab6a5719127e1d0878478823e60357d2b9f8ee6f5909fa639d3c9f077