Analysis

  • max time kernel
    3055658s
  • max time network
    164s
  • platform
    android_x64
  • resource
    android-x64-arm64-20231023-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231023-enlocale:en-usos:android-11-x64system
  • submitted
    09-11-2023 22:02

General

  • Target

    71ddfacd8ba48806396c95b279237998945cf8124875728f92d8a9d0489cddd2.apk

  • Size

    4.2MB

  • MD5

    e6884f20167962f305e982b47761079b

  • SHA1

    f09d1f9124c2c809605ef3a8337813af85f7f12b

  • SHA256

    71ddfacd8ba48806396c95b279237998945cf8124875728f92d8a9d0489cddd2

  • SHA512

    7a5cabbdce1045bc6b05b7429f968c16c66c7b0191e48cdc342900c2eb68ad82e27a9cf2a408f74456694f2addab70cd52413a5ae3d9b4dc1200372872a33145

  • SSDEEP

    98304:TEkOfIt6JcHT2VuI8xzl4Q6t2bbA+tVm2whnorn6K:TWItpT2ul4EbS2

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot payload 1 IoCs
  • Makes use of the framework's Accessibility service. 1 IoCs
  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • com.autonavi.minimap
    1⤵
    • Makes use of the framework's Accessibility service.
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:4422

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.autonavi.minimap/code_cache/secondary-dexes/base.apk.classes1.zip

    Filesize

    2.4MB

    MD5

    6976b87cb589f488a5846d404b573d55

    SHA1

    710485ff1cb58501627df7efc72b80fcaa314e80

    SHA256

    740cffddf30d6e2fe9bda6336950258dbd9602001559c3917409e5fffcdd3af7

    SHA512

    f76058a7689f345a429c53ae2acf2fa0c1f183a2342c16c8dcf510620e94b81d8f41feb5cc4c07ba551bc4231eaa6654e99c659ebd2ea2d0b6ef42e0bd1b8e31

  • /data/user/0/com.autonavi.minimap/code_cache/secondary-dexes/tmp-base.apk.classes3021749285033010324.zip

    Filesize

    879KB

    MD5

    ee8f29b482b24b051f36ac008e93f63e

    SHA1

    9c340fdafcb0cb4340f3879ecc87537bda199831

    SHA256

    b38df0ec474cc12d3594993f31bec1859b70d1f51e2628b3e193bafcc40201ba

    SHA512

    ed0e04b4d420a7a81e510197a2460349f9f73a856ee817d28c5ab72e854c8cabc2b358e390b4edd91fea80feb0a65368a5dde91159632b2076bd5409b98ab72e