Analysis
-
max time kernel
2518539s -
max time network
162s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
20-12-2023 11:17
Static task
static1
Behavioral task
behavioral1
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Behavioral task
behavioral2
Sample
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
Resource
android-x64-20231215-en
General
-
Target
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b.apk
-
Size
5.0MB
-
MD5
3a0db08d86d3d57edea7d52843f32761
-
SHA1
1b24cb57faf69c2a955f1c10c911f1b16238a12c
-
SHA256
a959108ec8f93ee4c71e588236788d17372f9d61b8f71a509a776f097889f36b
-
SHA512
5e40d236ee94a9d14b66dbd282d25e0818ac3a58b04719b9bf7beb88cdaa5c99ee07f85545927d7fb3cf331972d7dfeb397fa89c57f4d6a04507014e85f45e50
-
SSDEEP
98304:b3tpB+92T+4CL6FCWFwonRhI1PMmkic+E:b3F+HL6gwwAhIutig
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T family_flubot -
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.iqiyi.i18ndescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.iqiyi.i18n Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.iqiyi.i18n -
Processes:
com.iqiyi.i18npid process 4512 com.iqiyi.i18n -
Loads dropped Dex/Jar 5 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.iqiyi.i18nioc pid process /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T 4512 com.iqiyi.i18n [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.iqiyi.i18n/gUej8pueyg/IyGg9Ik9TUhy7gF/base.apk.y8a7FeG1.j8T] 4512 com.iqiyi.i18n /apex/com.android.art/javalib/core-oj.jar 4512 com.iqiyi.i18n /apex/com.android.conscrypt/javalib/conscrypt.jar 4512 com.iqiyi.i18n /apex/com.android.art/javalib/okhttp.jar 4512 com.iqiyi.i18n -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.iqiyi.i18ndescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.iqiyi.i18n -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 icanhazip.com -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.iqiyi.i18ndescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.iqiyi.i18n -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.iqiyi.i18ndescription ioc process Framework API call javax.crypto.Cipher.doFinal com.iqiyi.i18n
Processes
-
com.iqiyi.i18n1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4512
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.7MB
MD517bf082d9e9a6eb8b5d62d82f4af5476
SHA1a401c7fbd8feea319dbcece5b4b3f6a254e71fb3
SHA2564df590b764f65c16b51176ff394458d0b3a866ca75a4f912d6f76b7793043c1c
SHA512f1a2673bf5c478176de0fceec8419434ab0606a14343c3b7fe1e2b181b0a2ff8f00c888ea1dcb8e711c4eb14aa1294919440adc63ce7735a67e93da21a0f7ae7
-
Filesize
395KB
MD52f737c10c13ddf1f3fe95054827891ca
SHA139233441365dbb7da364b4e75912f80e3b3abca5
SHA2564214986fc39f65f743d77a4df6c79e12b969f173efc88ede281dd9b33c55d0df
SHA51249907944fbc14692bba4587693cf2f9b1bbc9723b5e48fb641b6fde7f4cfe0f5813d3231d204a774fa3333ce7deb411fa0cbb33382e04bdc70791f4d9de436ba
-
Filesize
429KB
MD5ef9180f2d6baa6c7214403ec8f3b7ec5
SHA10da13630b0c13810bcea946dd88ec66774fcd502
SHA256e56c2ca20f560f0c18610d592394f6aeae28a5838d03c7bcbcc5904a56b8e04b
SHA512aa76abfe5d0d76ce1630d99b0b1ed133e782d30725169c9090529ac93c81251389a68153299013aa7a89af0d0430475d52310b7639ca048cb1cc516fa8ce879a
-
Filesize
2.0MB
MD5f5e57e82ea5780959e6aaf565471ef48
SHA1e24a60d1c555ae67bc3cc25ccfee7ebfcd38f3fc
SHA25695d36647c1d8bac43a885cc4327a4af43ad0a8f7f84a71c74240948f19270ea2
SHA5124c7eea8f0840bda44a0191fa1919a6e49809ef62b99c2bfe06c1b9c5bdeeb83c0328fd9aae886b29ebc01fc8fd79f9dc1cc1fc1d90d198e056d0a19af4e899fe
-
Filesize
927KB
MD583b4b0b7130c2f606b0b623298bb1847
SHA1e15fd51e0bb16a3dda3304e3cc9fb3644f818357
SHA256ce969f069965429defac143d49cf3d5d25e885a2dff1c890d085b5c7d85ab947
SHA512215fdea85c31245aad96eeda01bd355c118bbcb39a1e281fe614b82df57ee28747511ab1912e6b8d1f912095bd8fb4f6a91a820c5a999c96c31730d855c5e648