Overview
overview
10Static
static
730d557fef0...d8.apk
android-9-x86
130d557fef0...d8.apk
android-10-x64
1030d557fef0...d8.apk
android-11-x64
10appboy-htm...ent.js
windows7-x64
1appboy-htm...ent.js
windows10-2004-x64
1t-rex.html
windows7-x64
1t-rex.html
windows10-2004-x64
1vk_dex.apk
android-9-x86
vk_dex.apk
android-10-x64
vk_dex.apk
android-11-x64
Analysis
-
max time kernel
529212s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
11-10-2023 10:09
Static task
static1
Behavioral task
behavioral1
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appboy-html-in-app-message-javascript-component.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
t-rex.html
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
t-rex.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
vk_dex.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral9
Sample
vk_dex.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral10
Sample
vk_dex.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8.apk
-
Size
5.5MB
-
MD5
2600311823e0c228f0231650689bc751
-
SHA1
8cb68c08014f70d84f63acd0c8829a977d538a6b
-
SHA256
30d557fef09fc14bea100e880d5cd5c3784faadfd39a1940ce17cb4eea8d8fd8
-
SHA512
3f0b8713613c94a40e61cef6eeb782ebb8455d12a889c46051d89ddeab68c5b2fb17c50543dd782b0f23f7887a496f6dc2a23063ce879197f5460b72e6903eff
-
SSDEEP
98304:Dmn7cHFTHHYDODB7Cg2kJ+KKLht8//i6fZKPHfrXuJsJSsfxVc3ntn5OrQ/sWYrw:Dmolz4DwBP2O+KKGiEFSJ9fxVc9nMrVu
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.snda.wifilocating/foevkdih4J/jfefinzzueY9ghv/base.apk.kfsgkhg1.hhI family_flubot -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.snda.wifilocatingdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.snda.wifilocating -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.snda.wifilocatingioc pid process /data/user/0/com.snda.wifilocating/foevkdih4J/jfefinzzueY9ghv/base.apk.kfsgkhg1.hhI 4998 com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.snda.wifilocatingdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.snda.wifilocating/foevkdih4J/jfefinzzueY9ghv/tmp-base.apk.kfsgkhg6954669137408401606.hhI
Filesize1.4MB
MD505beee762bb9e5788dd57281673df6c6
SHA184978922920e9f1c866fdf4fafae4af3c248096b
SHA256ab055501404491212b433cb8ea3079a60e226d5d8ad15faa9cf49aad997d835e
SHA512cb015631559b57feec3ecc5753304386d5334fdab2fd5a2a0be69e4a502138034a4b1d4bdb1c2487093f612fb81801b79277ec07a2e4fcf12470a214061c2f75
-
Filesize
5.1MB
MD5fa800b8d7c67bee9f8b1236e1c766ca8
SHA1164f2b12a9454b469519c03df13c46b1b1072838
SHA2565517fe2688946160f19ceb65e704bb43ea60556b9cd33a67f57d0a1a2074b992
SHA512ef3ee966a1eb15713f4637631afc7ba9a0c1fe3e49e5ae52f11f3a78fe1e607f485f693b37bf849f554566a89421628a9fc2540565563a15ef9f5e0ff677bfdd