Overview
overview
10Static
static
74bf1e7a6e5...53.apk
android-11-x64
10appx/af-appx.min.js
android-11-x64
appx/af-ap...min.js
android-11-x64
appx/es6-p...min.js
android-11-x64
appx/index.html
android-11-x64
appx/secur...min.js
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
amc-h5.js
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
[email protected]
android-11-x64
amc-h5.js
android-11-x64
vi-amc.js
android-11-x64
widget_v8.js
android-11-x64
windmill.worker.js
android-11-x64
workerjs_m...ker.js
android-11-x64
workerjs_v8.js
android-11-x64
vi-amc.js
android-11-x64
widget_v8.js
android-11-x64
windmill.worker.js
android-11-x64
workerjs_m...ker.js
android-11-x64
workerjs_v8.js
android-11-x64
Analysis
-
max time kernel
3654238s -
max time network
168s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230831-enlocale:en-usos:android-11-x64system -
submitted
28-09-2023 03:19
Static task
static1
Behavioral task
behavioral1
Sample
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral2
Sample
appx/af-appx.min.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
appx/af-appx.worker.min.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appx/es6-promise.min.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral5
Sample
appx/index.html
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral6
Sample
appx/security-patch.min.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral14
Sample
amc-h5.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral22
Sample
amc-h5.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral23
Sample
vi-amc.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral24
Sample
widget_v8.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral25
Sample
windmill.worker.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral26
Sample
workerjs_multiworker.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral27
Sample
workerjs_v8.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral28
Sample
vi-amc.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral29
Sample
widget_v8.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral30
Sample
windmill.worker.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral31
Sample
workerjs_multiworker.js
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral32
Sample
workerjs_v8.js
Resource
android-x64-arm64-20230831-en
General
-
Target
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
-
Size
5.6MB
-
MD5
8289bde90df26a68d5e7205f008a2d0f
-
SHA1
d816fb5dc1fc5a02d2787a01d1b84b72b7e46b67
-
SHA256
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53
-
SHA512
855dac2cfa00e9d6b3581b0f46309ccd7ab5719a585b2ad70f76e6af2eaf99aee60b44dc2c5a832fb87054f1de1f97599d81e258ab8a929de89b9e437efdef04
-
SSDEEP
98304:6fOYaX5kvxq+Vcyscc6I4QzCbt9Y7hvy+UXYNvzsKYr8OZPyxrf:IaJKE2c6I3Cbt9GhqlY1zs1rPPyNf
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mtt/gGTggfjg9U/hygyUtg78qgdGug/base.apk.jwUw8fI1.fIy family_flubot -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.tencent.mttdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mtt -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mttioc pid process /data/user/0/com.tencent.mtt/gGTggfjg9U/hygyUtg78qgdGug/base.apk.jwUw8fI1.fIy 4561 com.tencent.mtt -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 icanhazip.com 28 icanhazip.com 31 ipinfo.io 240 icanhazip.com 243 icanhazip.com 494 ipinfo.io 497 ipinfo.io -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mttdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mtt
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5fedf5904b8284b9ca9c1050cb2460beb
SHA10d15bb251093f79701fff7cc9fcb81a5a1366a23
SHA256d3cb089682763f902160ca61352cb282216ff42407a83a17d06e2ec57c7a8d6e
SHA51239680d46ddee9713f112afe57800807093024ef00175fe9c9caa58a532b3fe11e25fd5aefc955a920e31ac18f1996701b83fceddae0a5ec751a0b02f8bf3ded8
-
Filesize
925KB
MD5f65f9baff80a0a15d5ec92aaae235dcf
SHA1836da1f2e92b1ec426531b5ae1aaaa619c9a5f2a
SHA2561eee2ef3b6ba06ed10571100a4e2c29303321922baad7e04e04658395e949d8f
SHA512b2b13cf88e6001756037a61e1829ec653fd140928e0846167e92e79e70dd511b591c4beca7116b438d2da3c4e0867393f04da63150a2c1998ae752c20ca32a92