Analysis

  • max time kernel
    586233s
  • max time network
    170s
  • platform
    android_x64
  • resource
    android-x64-arm64-20230831-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230831-enlocale:en-usos:android-11-x64system
  • submitted
    11-10-2023 17:07

General

  • Target

    4859ab9cd5efbe0d4f63799126110d744a42eff057fa22ff1bd11cb59b49608c.apk

  • Size

    6.0MB

  • MD5

    06371fc75740162de9e6275102012e6c

  • SHA1

    9b45243e89541ae26fea5ff2b9c7d14ff69044ed

  • SHA256

    4859ab9cd5efbe0d4f63799126110d744a42eff057fa22ff1bd11cb59b49608c

  • SHA512

    c865d89143effb176c4be93fc16f54e06d248f5b7e22ffbf19754137f9da181f6d7f6019cdb28d2d7964375b1978a255c475dd3d17487fddb9fa0e4eda8bf248

  • SSDEEP

    98304:fC3rjZ1lQTKUHiLoQwaFaxCiFXzTVNeWr4kUCzwHrqrtQUn5HHOwBFyxrlV:fCvlLLNwaF8DhX4k9SrEbBFyN3

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot payload 1 IoCs
  • Makes use of the framework's Accessibility service. 3 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
  • Removes a system notification. 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.tencent.mobileqq
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Removes a system notification.
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4602

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tencent.mobileqq/eGGggUk6i7/GI8kghfhhThU88f/base.apk.eUftgIu1.jjI

    Filesize

    2.0MB

    MD5

    50047ec0209d69081cbd555b6c385a49

    SHA1

    98175443858a4f2998719a02e3446d610e7157ed

    SHA256

    b1951dfd1028e85d5f62f6d5337bc9132625d4c3f972a4050e15f50daac18c2c

    SHA512

    58a3b30b6a9315ef775bafe977b03b6e9771d764561de7c225c881b5c83d3551cd67408a2ad35504a7eb729c66c3af7158abdb18fb54df17d7a6c1fd6ebd539a

  • /data/user/0/com.tencent.mobileqq/eGGggUk6i7/GI8kghfhhThU88f/tmp-base.apk.eUftgIu2860114463782166394.jjI

    Filesize

    915KB

    MD5

    42ebd0868bcb875ea770e2fb0d8064e3

    SHA1

    fe1cec67c766c777507da6949d04daebbad21723

    SHA256

    2df9eef913ee3b9fd3803b0d0363c52d4294c9fadfe00ca0b23a854fcbd10c70

    SHA512

    a381e0ef3557c0d5fc561aa59a5abdcd8461698abd623846159b257b9c2f3168bea35d1bd8db3c3b842e1f2638feae224e1e847cc3c46076983bca3aa08c322b