Overview
overview
10Static
static
74bf1e7a6e5...53.apk
android-9-x86
14bf1e7a6e5...53.apk
android-10-x64
104bf1e7a6e5...53.apk
android-11-x64
10appx/af-appx.min.js
windows7-x64
1appx/af-appx.min.js
windows10-2004-x64
1appx/af-ap...min.js
windows7-x64
1appx/af-ap...min.js
windows10-2004-x64
1appx/es6-p...min.js
windows7-x64
1appx/es6-p...min.js
windows10-2004-x64
1appx/index.html
windows7-x64
1appx/index.html
windows10-2004-x64
1appx/secur...min.js
windows7-x64
1appx/secur...min.js
windows10-2004-x64
1appx/web-view.min.js
windows7-x64
1appx/web-view.min.js
windows10-2004-x64
1appx/worker.min.js
windows7-x64
1appx/worker.min.js
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1amc-h5.js
windows7-x64
1Analysis
-
max time kernel
529170s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
11-10-2023 10:11
Static task
static1
Behavioral task
behavioral1
Sample
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appx/af-appx.min.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appx/af-appx.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
appx/af-appx.worker.min.js
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
appx/af-appx.worker.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
appx/es6-promise.min.js
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
appx/es6-promise.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
appx/index.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
appx/index.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
appx/security-patch.min.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
appx/security-patch.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
appx/web-view.min.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
appx/web-view.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
appx/worker.min.js
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
appx/worker.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
amc-h5.js
Resource
win7-20230831-en
General
-
Target
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53.apk
-
Size
5.6MB
-
MD5
8289bde90df26a68d5e7205f008a2d0f
-
SHA1
d816fb5dc1fc5a02d2787a01d1b84b72b7e46b67
-
SHA256
4bf1e7a6e5febfb345b13a596b954e50c59d9506046592d39d4a6e9f01dfea53
-
SHA512
855dac2cfa00e9d6b3581b0f46309ccd7ab5719a585b2ad70f76e6af2eaf99aee60b44dc2c5a832fb87054f1de1f97599d81e258ab8a929de89b9e437efdef04
-
SSDEEP
98304:6fOYaX5kvxq+Vcyscc6I4QzCbt9Y7hvy+UXYNvzsKYr8OZPyxrf:IaJKE2c6I3Cbt9GhqlY1zs1rPPyNf
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mtt/gGTggfjg9U/hygyUtg78qgdGug/base.apk.jwUw8fI1.fIy family_flubot -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.tencent.mttdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mtt -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mttioc pid process /data/user/0/com.tencent.mtt/gGTggfjg9U/hygyUtg78qgdGug/base.apk.jwUw8fI1.fIy 5035 com.tencent.mtt -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 782 icanhazip.com 781 icanhazip.com -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mttdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mtt
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
925KB
MD5f65f9baff80a0a15d5ec92aaae235dcf
SHA1836da1f2e92b1ec426531b5ae1aaaa619c9a5f2a
SHA2561eee2ef3b6ba06ed10571100a4e2c29303321922baad7e04e04658395e949d8f
SHA512b2b13cf88e6001756037a61e1829ec653fd140928e0846167e92e79e70dd511b591c4beca7116b438d2da3c4e0867393f04da63150a2c1998ae752c20ca32a92
-
Filesize
2.0MB
MD5fedf5904b8284b9ca9c1050cb2460beb
SHA10d15bb251093f79701fff7cc9fcb81a5a1366a23
SHA256d3cb089682763f902160ca61352cb282216ff42407a83a17d06e2ec57c7a8d6e
SHA51239680d46ddee9713f112afe57800807093024ef00175fe9c9caa58a532b3fe11e25fd5aefc955a920e31ac18f1996701b83fceddae0a5ec751a0b02f8bf3ded8