Analysis

  • max time kernel
    2907729s
  • max time network
    164s
  • platform
    android_x64
  • resource
    android-x64-arm64-20230621-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230621-enlocale:en-usos:android-11-x64system
  • submitted
    31-07-2023 18:51

General

  • Target

    bbe7f3bc15429196cc01935295ff6a7867b2fc501d1896b01afe62fbce2ed314.apk

  • Size

    3.6MB

  • MD5

    5b38cb30eb591eeefd6893b0ec04d44b

  • SHA1

    668c2bb8cb3d3aa9520c90b85cfb33becb2b3aea

  • SHA256

    bbe7f3bc15429196cc01935295ff6a7867b2fc501d1896b01afe62fbce2ed314

  • SHA512

    03602474872b49d22370db4eace3374c7f5a726ac128400ab1ec1df89af40a48d33427d9bf6b3bafbea5f1724b1b4f008c2010ac1a8b6c88a99f0c8b1678a4ca

  • SSDEEP

    98304:9UrPJfylp4QhegEGmJHgi3nheMSQXl7rXdLdO5e3W3Y:9dlSQhegAXHDZOs3J

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot payload 1 IoCs
  • Makes use of the framework's Accessibility service. 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.

Processes

  • com.qq.reader
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    PID:4274

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.qq.reader/bg9vI94ofk/h4sheln9ohdoo98/base.apk.vgkdhfl1.hfv

    Filesize

    2.2MB

    MD5

    c7ea97ddf2d3b3760db476d88785a44e

    SHA1

    dcaa3795d2c2efbb1fedd8ef1ac83ab818dd1a10

    SHA256

    1f30dcdb244fadc68d100f87833db42fb4191fbbd7a08627ed8cb95beeae223c

    SHA512

    d7f227b86dd117f607bab5937a6ef29a69ee1cae3c7ee5a4b9ea4d44533bba8ec36fb0a5d12acafc1bfcf6df04edd69e31a4259077a4cff47aa2096493fc494f

  • /data/user/0/com.qq.reader/bg9vI94ofk/h4sheln9ohdoo98/ljizgvdm.gh5f

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.qq.reader/bg9vI94ofk/h4sheln9ohdoo98/tmp-base.apk.vgkdhfl5060970825112182266.hfv

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/com.qq.reader/shared_prefs/DHL.xml

    Filesize

    133B

    MD5

    9b3e25a75626e82ae769caa851f645c4

    SHA1

    e07ad295975680193ea609561de459411c7dbf26

    SHA256

    773db359346018edbca9f58cbecf626aeac2bcb16e18680f430aa2639f97688e

    SHA512

    526f289688a1ba17ccf98bc2c0980d4ae8fbc1c1e7096ab8998f84ee4ee042a5c227b9df5857219850b9061c172d8472f5defda70e0d34f3f2928593f3adb2bb

  • /data/user/0/com.qq.reader/shared_prefs/multidex.version.xml

    Filesize

    307B

    MD5

    a623dba87ce21268679541eb3b7db81d

    SHA1

    626bf2e667626f9b7ccecb38f77389584a904340

    SHA256

    d35451e5ca172bffd9c535197a3b771582b79ef84b127d96ea5911263b4f6ad2

    SHA512

    0cf6d570b6b8dd3d65998c6fadae5a8ed8c3d107ce8c089df3ce54e5cea3ac05d39de248ec2507d343d72657c1c4aa27697b9f59c9f7ff33aeea3385571543d4