Analysis
-
max time kernel
381627s -
max time network
639s -
platform
android_x64 -
resource
android-x64-arm64-20220823-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20220823-enlocale:en-usos:android-11-x64system -
submitted
26-10-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
eb446a816c77cab326d2fe91fb9b3dd3e5be21e0eb0e4eb35fbdebcdc8d56d35_unpacked.apk
-
Size
4.0MB
-
MD5
2ffac6c6ba63598b34dc8a076208f7b4
-
SHA1
02d20c723835a961b594ada5c5acff8ee5ed9bab
-
SHA256
2af548766f9a368e72dfab3c5bf4123da0d52f603e405e801f79a4a9c5b5c07c
-
SHA512
fbb2955d883d9275bfa0f7c23ca1110ceed1b13083ec249f8445c9c203fdbd9554c36ab91b7c3634871812f3661a7a0b33dc4168b2ef0f1afcff26e370468bd8
-
SSDEEP
98304:+1iNL19D17KA443+dt+G9ZDPAC77jZRFJhYv09Lc:7NLLZ7l4F2+97j7FJ/Lc
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 3 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.tencent.mmdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mmioc pid process /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4582 com.tencent.mm /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4582 com.tencent.mm -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.tencent.mmdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mm -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.tencent.mmdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mmdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
Filesize
3.1MB
MD5aca8ab11deeeed62a960d35ffa984401
SHA1a20fc21166d30e80f0f8cfcd3ce7c7a11b579960
SHA25645b81ea4e359f1a2ccd0a4d537dbbc9fa5839a5c1a81ea26febd3abba5df67cf
SHA512c0637ee40a12db71c5edfbc51bdb2b5cbb562068047a36cb9e3af9e45087c6b8355ea95c5ffeec6b45fb6cf71dd6a3fd2d5fc046b4b340652adbfb3c2e574cb8
-
Filesize
133B
MD5458e9b659f1c8caf17896cd949e612a6
SHA1314f9d77b125d31d61eddfcdd16f1ee095fb3573
SHA25632e56fa015b92af86c7e237fdbbb47860d06b2249be93e6f6859231dadd5f32f
SHA5125a1a28f824b88ab69ae543580d8f7e30e953b022d72c6666c9bbeda2b681023789c63a1767e66bef671eaad4a7fad7e21b4706951b7230a049fed8a353b8a3cf
-
Filesize
197B
MD5aefc3ba86be8cfa9f20edfddfbdf32c9
SHA1730b1cff6893e07dc352615e1bad8bd4c3c59305
SHA256a08e2f6ef69f7ddea5529e95febfeaed9c41edb830b30d7be5764e9346e1ca56
SHA512398b31b85377462eb66e82c459d809610ee20265fb1520328920045ffcc110937892b6367e8d13dc04a3051a712289924ab8e1d27615ed8177025ed48a95e72b