Analysis
-
max time kernel
377128s -
max time network
163s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230831-enlocale:en-usos:android-11-x64system -
submitted
09-10-2023 22:03
Static task
static1
Behavioral task
behavioral1
Sample
4751009aa937ea9fc90d879b84e7f745ac606080e9bb783ec6a2b222fdff4da7.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
4751009aa937ea9fc90d879b84e7f745ac606080e9bb783ec6a2b222fdff4da7.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
4751009aa937ea9fc90d879b84e7f745ac606080e9bb783ec6a2b222fdff4da7.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
sConsole.html
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
sConsole.html
Resource
win10v2004-20230915-en
General
-
Target
4751009aa937ea9fc90d879b84e7f745ac606080e9bb783ec6a2b222fdff4da7.apk
-
Size
4.6MB
-
MD5
3c95df948d9fb9c64b1c71b8eb7fad05
-
SHA1
a4be8061655f1ef9eacc906af1465aca68a27a9b
-
SHA256
4751009aa937ea9fc90d879b84e7f745ac606080e9bb783ec6a2b222fdff4da7
-
SHA512
54f4bfc02a7bd169f2f4da48c1a247403ef2ab74986331e922c7d17d66225a66fd937ffbf51d2977395a746b73f4f5ca3be7911512b856eef418eee0e02194f4
-
SSDEEP
98304:CWAMjd6nGZjaO+DVre7FnOy/vw17D00UrcnDqAjDd0BhuenDPWcrOSxyu526XT:nR6nGVaOKyR07D07cnDqIDaBznDPW/u5
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/base.apk.hIIhgfy1.yfe family_flubot [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/base.apk.hIIhgfy1.yfe] family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mobileqq -
Processes:
com.tencent.mobileqqpid process 4532 com.tencent.mobileqq -
Loads dropped Dex/Jar 5 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/base.apk.hIIhgfy1.yfe 4532 com.tencent.mobileqq [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/base.apk.hIIhgfy1.yfe] 4532 com.tencent.mobileqq /apex/com.android.art/javalib/core-oj.jar 4532 com.tencent.mobileqq /apex/com.android.conscrypt/javalib/conscrypt.jar 4532 com.tencent.mobileqq /apex/com.android.art/javalib/okhttp.jar 4532 com.tencent.mobileqq -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mobileqq -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2975 icanhazip.com 45 api64.ipify.org 327 ipinfo.io 328 ipinfo.io 897 icanhazip.com 1858 ipinfo.io -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mobileqq -
Removes a system notification. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.tencent.mobileqq -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
-
com.tencent.mobileqq1⤵
- Makes use of the framework's Accessibility service.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD517bf082d9e9a6eb8b5d62d82f4af5476
SHA1a401c7fbd8feea319dbcece5b4b3f6a254e71fb3
SHA2564df590b764f65c16b51176ff394458d0b3a866ca75a4f912d6f76b7793043c1c
SHA512f1a2673bf5c478176de0fceec8419434ab0606a14343c3b7fe1e2b181b0a2ff8f00c888ea1dcb8e711c4eb14aa1294919440adc63ce7735a67e93da21a0f7ae7
-
Filesize
395KB
MD52f737c10c13ddf1f3fe95054827891ca
SHA139233441365dbb7da364b4e75912f80e3b3abca5
SHA2564214986fc39f65f743d77a4df6c79e12b969f173efc88ede281dd9b33c55d0df
SHA51249907944fbc14692bba4587693cf2f9b1bbc9723b5e48fb641b6fde7f4cfe0f5813d3231d204a774fa3333ce7deb411fa0cbb33382e04bdc70791f4d9de436ba
-
Filesize
429KB
MD5ef9180f2d6baa6c7214403ec8f3b7ec5
SHA10da13630b0c13810bcea946dd88ec66774fcd502
SHA256e56c2ca20f560f0c18610d592394f6aeae28a5838d03c7bcbcc5904a56b8e04b
SHA512aa76abfe5d0d76ce1630d99b0b1ed133e782d30725169c9090529ac93c81251389a68153299013aa7a89af0d0430475d52310b7639ca048cb1cc516fa8ce879a
-
Filesize
2.0MB
MD5c016c151db51699d0918b5ea2c05264b
SHA140f2fe439d5a40bc82f94e3d74ab265822ad4f43
SHA256b6be8e1e022f2f7eba312c87f79132cdb2c1a599c4c28bd2f85a5f0303ba175d
SHA5129ba8295477eb032f03df7ab4d5050d402c79ac82f91884d5d6a45c6e5db9ecd5ebfeb8c3f29915f6cfb9d1f9c17364987cdaa7694dfe3dec963a80914a71a403
-
/data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/tmp-base.apk.hIIhgfy6155397859685647994.yfe
Filesize927KB
MD559181d8dad336ebd1d54c725a919fea2
SHA1c77cf32355eb8c0f3e8697d0be09e8cb4268df25
SHA256b34520399710770e5ecde27fa2189deb7fdcc665865ac20403c5e5d68d7551a5
SHA5126bc3543ae1197821fcb080c8c11bcfbb691a9d47d191fa1bb139efca39d43c262830f62494f3d34859f94cc74627e0b5953e0aade12ce7941aa053e76d57e03f
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.tencent.mobileqq/GejIfI6ew8/G7UUGHph7peUT8s/base.apk.hIIhgfy1.yfe]
Filesize2.0MB
MD5c016c151db51699d0918b5ea2c05264b
SHA140f2fe439d5a40bc82f94e3d74ab265822ad4f43
SHA256b6be8e1e022f2f7eba312c87f79132cdb2c1a599c4c28bd2f85a5f0303ba175d
SHA5129ba8295477eb032f03df7ab4d5050d402c79ac82f91884d5d6a45c6e5db9ecd5ebfeb8c3f29915f6cfb9d1f9c17364987cdaa7694dfe3dec963a80914a71a403