Overview
overview
10Static
static
7df98a8b9f1...6f.apk
android-9-x86
1df98a8b9f1...6f.apk
android-10-x64
10df98a8b9f1...6f.apk
android-11-x64
10appx/af-appx.min.js
windows7-x64
1appx/af-appx.min.js
windows10-2004-x64
1appx/af-ap...min.js
windows7-x64
1appx/af-ap...min.js
windows10-2004-x64
1appx/es6-p...min.js
windows7-x64
1appx/es6-p...min.js
windows10-2004-x64
1appx/index.html
windows7-x64
1appx/index.html
windows10-2004-x64
1appx/secur...min.js
windows7-x64
1appx/secur...min.js
windows10-2004-x64
1appx/web-view.min.js
windows7-x64
1appx/web-view.min.js
windows10-2004-x64
1appx/worker.min.js
windows7-x64
1appx/worker.min.js
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1amc-h5.js
windows7-x64
1Analysis
-
max time kernel
530597s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20230831-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230831-enlocale:en-usos:android-10-x64system -
submitted
11-10-2023 10:12
Static task
static1
Behavioral task
behavioral1
Sample
df98a8b9f15f4c70505d7c8e0c74b12ea708c084fbbffd5c38424481ae37976f.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
df98a8b9f15f4c70505d7c8e0c74b12ea708c084fbbffd5c38424481ae37976f.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
df98a8b9f15f4c70505d7c8e0c74b12ea708c084fbbffd5c38424481ae37976f.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral4
Sample
appx/af-appx.min.js
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
appx/af-appx.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral6
Sample
appx/af-appx.worker.min.js
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
appx/af-appx.worker.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral8
Sample
appx/es6-promise.min.js
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
appx/es6-promise.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
appx/index.html
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
appx/index.html
Resource
win10v2004-20230915-en
Behavioral task
behavioral12
Sample
appx/security-patch.min.js
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
appx/security-patch.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral14
Sample
appx/web-view.min.js
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
appx/web-view.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
appx/worker.min.js
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
appx/worker.min.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral32
Sample
amc-h5.js
Resource
win7-20230831-en
General
-
Target
df98a8b9f15f4c70505d7c8e0c74b12ea708c084fbbffd5c38424481ae37976f.apk
-
Size
5.5MB
-
MD5
42331cf55ee2174ac0d137d27633f7ea
-
SHA1
c67ce535777198f1bac3a7b7bd34817255c05e13
-
SHA256
df98a8b9f15f4c70505d7c8e0c74b12ea708c084fbbffd5c38424481ae37976f
-
SHA512
ffef78b5f7507cf444f9b1b03f5d655b4c88b6c9d00fa10455179d63003d2cd52b120d5ec81fa031bd920f711f5a3cf42d804da51f418314779de4e508336d32
-
SSDEEP
98304:f++ca+O+GSgUvtRZb9WFbto/q5qb3S1B3Y70sOyrDrfK/+xyxrUh4:W+cRODULN++S5qbOsOqCmxyNUh4
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/jG8seijrgu/8f8IjGUrgjhhrUf/base.apk.geIqgyG1.dUG family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mobileqq -
Processes:
com.tencent.mobileqqpid process 5024 com.tencent.mobileqq -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/jG8seijrgu/8f8IjGUrgjhhrUf/base.apk.geIqgyG1.dUG 5024 com.tencent.mobileqq -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 12 api64.ipify.org 39 api64.ipify.org 40 api64.ipify.org -
Removes a system notification. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.tencent.mobileqq -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.tencent.mobileqq/jG8seijrgu/8f8IjGUrgjhhrUf/tmp-base.apk.geIqgyG7558775464429430388.dUG
Filesize927KB
MD5fc9a38a6a589ebfd6725ee0ed4fb2f55
SHA1c6f325b7ef825fadbf75c470971ab1ea60799442
SHA256e8e2b883293a477f5797b140941dd8790c494415426f4d7dd6994b4c02c14e9b
SHA512e183e6e4daa676e52d4c6696bef6bee85e1ea43a511614e82612e86f198bbb36cf47d8e5251e503292f5ab7c4cc641ab1ef5b5903bc3db4a49638d6b84c98d1c
-
Filesize
2.0MB
MD5ad656fc403c35b6a716e073bcd6d7824
SHA1eb6b8c513a3abe5906a07d2fd3aed39a0de0cbd6
SHA256a72640470a5611a7c6864eafe02e2ed8bf589dfb88a7195a66423327c924953e
SHA5125c1c15c79ffdb4be81e7a7804d3dfa22122f9931ceff8e8a515d981aa8fee3211ad8acf08f02d946e7bb997ef016ddbe3f592ba742cc62712fd39c44725b3568