Overview
overview
10Static
static
745c8779a8c...be.apk
android-9-x86
145c8779a8c...be.apk
android-10-x64
1045c8779a8c...be.apk
android-11-x64
10appx/af-appx.min.js
windows7-x64
1appx/af-appx.min.js
windows10-2004-x64
1appx/af-ap...min.js
windows7-x64
1appx/af-ap...min.js
windows10-2004-x64
1appx/es6-p...min.js
windows7-x64
1appx/es6-p...min.js
windows10-2004-x64
1appx/index.html
windows7-x64
1appx/index.html
windows10-2004-x64
1appx/secur...min.js
windows7-x64
1appx/secur...min.js
windows10-2004-x64
1appx/web-view.min.js
windows7-x64
1appx/web-view.min.js
windows10-2004-x64
1appx/worker.min.js
windows7-x64
1appx/worker.min.js
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1[email protected]
windows7-x64
1[email protected]
windows10-2004-x64
1amc-h5.js
windows7-x64
1Analysis
-
max time kernel
3055354s -
max time network
166s -
platform
android_x64 -
resource
android-x64-arm64-20231023-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231023-enlocale:en-usos:android-11-x64system -
submitted
09-11-2023 22:00
Static task
static1
Behavioral task
behavioral1
Sample
45c8779a8cc21c9094d548ee40eebd6731c4bba53ebb794b696cd7ef51c9ccbe.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
45c8779a8cc21c9094d548ee40eebd6731c4bba53ebb794b696cd7ef51c9ccbe.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
45c8779a8cc21c9094d548ee40eebd6731c4bba53ebb794b696cd7ef51c9ccbe.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
appx/af-appx.min.js
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
appx/af-appx.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
appx/af-appx.worker.min.js
Resource
win7-20231020-en
Behavioral task
behavioral7
Sample
appx/af-appx.worker.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral8
Sample
appx/es6-promise.min.js
Resource
win7-20231023-en
Behavioral task
behavioral9
Sample
appx/es6-promise.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral10
Sample
appx/index.html
Resource
win7-20231023-en
Behavioral task
behavioral11
Sample
appx/index.html
Resource
win10v2004-20231020-en
Behavioral task
behavioral12
Sample
appx/security-patch.min.js
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
appx/security-patch.min.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
appx/web-view.min.js
Resource
win7-20231025-en
Behavioral task
behavioral15
Sample
appx/web-view.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral16
Sample
appx/worker.min.js
Resource
win7-20231020-en
Behavioral task
behavioral17
Sample
appx/worker.min.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
amc-h5.js
Resource
win7-20231020-en
General
-
Target
45c8779a8cc21c9094d548ee40eebd6731c4bba53ebb794b696cd7ef51c9ccbe.apk
-
Size
4.8MB
-
MD5
582086dca931b49a73f0335264d57727
-
SHA1
b00ab4450f5c4af1a997becfbb495d9d083061b0
-
SHA256
45c8779a8cc21c9094d548ee40eebd6731c4bba53ebb794b696cd7ef51c9ccbe
-
SHA512
e6d63f85bb44042bc201a1ac10d8cddf61d00bda8eabf913b1861c63ffc0c0e38c85867528e5f910310a545a4223ba31ada2c0e877eb7310a5b1aa4081d10775
-
SSDEEP
98304:oRoP+Kyuqxm2ePvKAOx6vOIFOd7wWbpHjA99tytfDOhdxQqvyxrAt:4omGqxL0OoOIy1VU99tIDVqvyNe
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.autonavi.minimap/uk8g8Hpjp9/uIhfU8h9ffyfgif/base.apk.iyIUTky1.h6q family_flubot -
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.autonavi.minimapdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.autonavi.minimap Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.autonavi.minimap Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.autonavi.minimap -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.autonavi.minimapioc pid process /data/user/0/com.autonavi.minimap/uk8g8Hpjp9/uIhfU8h9ffyfgif/base.apk.iyIUTky1.h6q 4378 com.autonavi.minimap -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.autonavi.minimapdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.autonavi.minimap -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 ipinfo.io 41 ipinfo.io 22 api64.ipify.org -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.autonavi.minimapdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.autonavi.minimap -
Removes a system notification. 1 IoCs
Processes:
com.autonavi.minimapdescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.autonavi.minimap -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.autonavi.minimapdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.autonavi.minimap
Processes
-
com.autonavi.minimap1⤵
- Makes use of the framework's Accessibility service.
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4378
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD559cc9e75ae46cbd072fbf414ed75e30c
SHA158d6da275b012b218685d76fa0eb579c2465425d
SHA256d354660248f18ee9e3e918640896e8d092d1da81ae74745f8d0bd0525bc87ad0
SHA5123cdf24311ebe9e7cb7c244ddb7c9683114d49866137b2fd9af6b8911ff814075f1b636b343e8254a6593e573f4b531f4c209bfd76494c0532e66124dca44f686
-
/data/user/0/com.autonavi.minimap/uk8g8Hpjp9/uIhfU8h9ffyfgif/tmp-base.apk.iyIUTky7619624845498903326.h6q
Filesize914KB
MD5563016b4d5cf157ae2922d45d282ab29
SHA1dc8b61cea19a6f16fe2881a42076e976722f259d
SHA25681275f680a3a4b7fb171ea096de6eb57a4b0b47629c1f15341c07434ade6c650
SHA512815ca87f29224fcf9792184de01a12a87a906db2373059d3e9b72d3ef95c78a2ecd44ea87611f751faf4a952d4502da29aad941266291145f8be0e06efef9e29