Overview
overview
10Static
static
7Malware.unknown.apk
android-10-x64
10license-ru.html
android-10-x64
license.html
android-10-x64
UserDict.pyc
android-10-x64
_abcoll.pyc
android-10-x64
_sysconfigdata.pyc
android-10-x64
_weakrefset.pyc
android-10-x64
abc.pyc
android-10-x64
copy_reg.pyc
android-10-x64
genericpath.pyc
android-10-x64
linecache.pyc
android-10-x64
os.pyc
android-10-x64
posixpath.pyc
android-10-x64
re.pyc
android-10-x64
site.pyc
android-10-x64
sre_compile.pyc
android-10-x64
sre_constants.pyc
android-10-x64
sre_parse.pyc
android-10-x64
stat.pyc
android-10-x64
sysconfig.pyc
android-10-x64
traceback.pyc
android-10-x64
types.pyc
android-10-x64
warnings.pyc
android-10-x64
render_h5_bridge.js
android-10-x64
shop_snaps...e.html
android-10-x64
workerjs_m...ker.js
android-10-x64
workerjs_v8.js
android-10-x64
Analysis
-
max time kernel
1796803s -
max time network
68s -
platform
android_x64 -
resource
android-x64-20230621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230621-enlocale:en-usos:android-10-x64system -
submitted
18-07-2023 22:21
Static task
static1
Behavioral task
behavioral1
Sample
Malware.unknown.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral2
Sample
license-ru.html
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
license.html
Resource
android-x64-20230621-en
Behavioral task
behavioral4
Sample
UserDict.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral5
Sample
_abcoll.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral6
Sample
_sysconfigdata.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral7
Sample
_weakrefset.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral8
Sample
abc.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral9
Sample
copy_reg.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral10
Sample
genericpath.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral11
Sample
linecache.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral12
Sample
os.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral13
Sample
posixpath.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral14
Sample
re.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral15
Sample
site.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral16
Sample
sre_compile.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral17
Sample
sre_constants.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral18
Sample
sre_parse.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral19
Sample
stat.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral20
Sample
sysconfig.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral21
Sample
traceback.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral22
Sample
types.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral23
Sample
warnings.pyc
Resource
android-x64-20230621-en
Behavioral task
behavioral24
Sample
render_h5_bridge.js
Resource
android-x64-20230621-en
Behavioral task
behavioral25
Sample
shop_snapshot_template.html
Resource
android-x64-20230621-en
Behavioral task
behavioral26
Sample
workerjs_multiworker.js
Resource
android-x64-20230621-en
Behavioral task
behavioral27
Sample
workerjs_v8.js
Resource
android-x64-20230621-en
General
-
Target
Malware.unknown.apk
-
Size
3.0MB
-
MD5
75c0eb2c78ff31534a588ec47088b622
-
SHA1
abc703f6e5b824d0a1c14108228009001509a162
-
SHA256
0de7ded6e4db0cb540ef7249c4bb96ca3147aa193801b06c5235781271bc4b23
-
SHA512
d0b74f972f851fc7a1f715e152e6f439a080b4d7b1f3129cec6c3164d8b1f75c34a920c393d5d05be45185a2b926b6c382b5e83387436b7905b2500e3db4c36b
-
SSDEEP
49152:Y09ypryDHH0D6gmPOroTV8asMbUCNhSBNwj0ciNcJ3W7HxTQqUonX73lwp:YXrWn0DAOroTV87w4kjD09RzUsyp
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 3 IoCs
resource yara_rule behavioral1/files/4868-0.dat family_flubot behavioral1/memory/4868-0.dex family_flubot behavioral1/memory/4868-1.dex family_flubot -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king 4868 com.xunmeng.pinduoduo /data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king 4868 com.xunmeng.pinduoduo
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD55b49441a9350dd3b4dba093b8faa2c8e
SHA1bbe36075bd706b87eb7f96fc498c83088b717226
SHA256c23491993bd680fa89ca42a5ff0695365e07c83874e4db29b96234d8a21fe10d
SHA512e4ce7f58ed24644094dee157d4e364c9bd4d68507bac760c760695dc2280052914bfeeb2c020f53b4e9e5da75e173bba28fd994176a4cea66d79a0e648279f94
-
Filesize
2.4MB
MD55b49441a9350dd3b4dba093b8faa2c8e
SHA1bbe36075bd706b87eb7f96fc498c83088b717226
SHA256c23491993bd680fa89ca42a5ff0695365e07c83874e4db29b96234d8a21fe10d
SHA512e4ce7f58ed24644094dee157d4e364c9bd4d68507bac760c760695dc2280052914bfeeb2c020f53b4e9e5da75e173bba28fd994176a4cea66d79a0e648279f94
-
Filesize
2.4MB
MD55b49441a9350dd3b4dba093b8faa2c8e
SHA1bbe36075bd706b87eb7f96fc498c83088b717226
SHA256c23491993bd680fa89ca42a5ff0695365e07c83874e4db29b96234d8a21fe10d
SHA512e4ce7f58ed24644094dee157d4e364c9bd4d68507bac760c760695dc2280052914bfeeb2c020f53b4e9e5da75e173bba28fd994176a4cea66d79a0e648279f94
-
Filesize
133B
MD5b01fd985b97e5e996c8c8cfcd0fb3d86
SHA17b3020a137472066448bdfbeef41820c5d2469dd
SHA256b6b4b3fa64017a06db0bd39f7e8b31e3c4fa4b51128af537132b393201de5b00
SHA512e96f2b1e1edea57e5b469b4d1fbab4fe3c044af36d32d6589f743396f5da8e3bde4bdee842a1978c9ad53752b1030dfa0b44e5fd8d87442392857941ea7f2ee7
-
Filesize
197B
MD54eeff05c946b882309409011252a1876
SHA192a88f14fcc8b0075266cd1b312506fbb83bc547
SHA256aebb73c7ed606493522c6d2886d93c4e705aebca7fc50b0ddc584165c98655c4
SHA5123ccd5986a109639fc72819006b5c7ec6e7affbc982ceb9db9b73f1a0bfdd75277bd0698d56a21b0635917e3ff4f773c7c91f04514d7ea3400251f09211a21374