Analysis
-
max time kernel
2518523s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
20-12-2023 11:17
Static task
static1
Behavioral task
behavioral1
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Behavioral task
behavioral2
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-20231215-en
General
-
Target
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
-
Size
5.0MB
-
MD5
3a0db08d86d3d57edea7d52843f32761
-
SHA1
1b24cb57faf69c2a955f1c10c911f1b16238a12c
-
SHA256
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b
-
SHA512
5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50
-
SSDEEP
98304:b3tpB+92T+4CL6FCWFwonRhI1PMmkic+E:b3F+HL6gwwAhIutig
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
resource yara_rule behavioral2/memory/4995-0.dex family_flubot -
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.iqiyi.i18n -
pid Process 4995 com.iqiyi.i18n -
Loads dropped Dex/Jar 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T 4995 com.iqiyi.i18n /apex/com.android.runtime/javalib/okhttp.jar 4995 com.iqiyi.i18n [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T] 4995 com.iqiyi.i18n /apex/com.android.runtime/javalib/core-oj.jar 4995 com.iqiyi.i18n -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.iqiyi.i18n
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD57e343cbc45b618d05182d74bd61826b2
SHA102ee96263b3b967e570e8ddb1fa36cb21032b71b
SHA256324b5af2ec2d78bb57b1552f429af51ac8d65f7fa277217ae8d4371ab14178d1
SHA51248cbd8a5b246cf9d6ec16558ab12af131439837094c63a64046de384da933593459fb1aec126393bbe3b2b8ca19437f38b68364c9f158023a7b1a35e6901c705
-
Filesize
396KB
MD5b93f8047ed660629c2efe0aef2bbe0e4
SHA17c63d6781b3f4e3ebecea0eabd707a9ffdbaa774
SHA256b6c05e60710e14ce7e7d02cfca7230d6251217374e465aaaca845426017ea89b
SHA5123a150d1227d123454018eeb232131b25d251277edbaa4e53c059499d9febf15eec429e0c419d9aa7bf5de212c86209e97a15560469b6322ec3c404d431b71e0e
-
Filesize
348KB
MD5216d32b7f00563aa00ae6c5896d8909c
SHA16031d18dc83b149d0e1d95a7068b5777eea205ff
SHA25651011e1b3fe2cf405001b5b201cb4ce11f2395ab50f37326219dfd8b5983221e
SHA51290da92a058cd089d80f65f75ef2e56c445b10c6d5adc7b1f5e7c2fad4c68fa9e2074c3d612fbed9e845997baa1dbbb8acac498f9d7194682bed73a323a3afa19
-
Filesize
2.0MB
MD5f5e57e82ea5780959e6aaf565471ef48
SHA1e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc
SHA25695d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2
SHA5124c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe