Analysis
-
max time kernel
2551145s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
23-12-2023 16:41
Static task
static1
Behavioral task
behavioral1
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa.apk
-
Size
6.7MB
-
MD5
528e717abda498c72a11370631410cad
-
SHA1
3a41286bdc3becf2f6eb6403c71ff4cce5dd6b0d
-
SHA256
4da397dcda35bd469b3af3c0f49ef7a2a4e19e3338f2b557560384d174b197fa
-
SHA512
0e054e89e39fa004580575002f6df4e484cc69bf5be6eabb968acd9d854ce34e77e3fb1aa47ef6c314885667d0419ac8c656af0bee5f64dd3872be8062a14e24
-
SSDEEP
196608:POeipkzfuE7GiqwZy9c9UlaxsXfZmV91g2ZbJolK0xxBk:meh7upiBZy90Ul/RmauolxxTk
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/data/com.tencent.mobileqq/app_DynamicOptDex/oBN.json family_flubot -
Makes use of the framework's Accessibility service 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oBN.json 4993 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oBN.json 4993 com.tencent.mobileqq -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD550dd5aa3d270400f2a8b5ae821bc0146
SHA1eff69432d8b2e72be0bb035b0d9f99abfd47680e
SHA256c23e1e9350074d07bdd4478851401a53bff1acccb762a50f7e6fc6f9c8e5bb12
SHA51299584f250854cdffbbce1890fec38b7a36716556983c11f5566ffbef885614a74b97f74b11da0aabf01160157b7a580aea5261f09b44e4f991026c3e3b623afa
-
Filesize
3.1MB
MD5ad8465c129549af17e79674174d034f0
SHA168d7f89e3f976b5ad66fcf9eb9b881259a41c8fb
SHA25641dd1e6416de4f990cfbc24ad3d9dc6bf830d2028adff42202bc5587fbf4c668
SHA51284f87c7f23c9e73d342ef5aca9bacf25dcce00d1b76c38d01b2678cf72c82689a62e41adfc77060d80e170ea8aece7022bc407c5f38065c7f4873f14de9df29e
-
Filesize
2KB
MD5ce152b0d80c97f99a44525da64b1a5d4
SHA17c8289d158991104909f4fc5b79a417e95794397
SHA256a24fa13fe6975031ff205e5895c8d12a5456fa12f1e013d8a7806e4288d4f6b1
SHA512c8c39c978e1ee9e32173dcf8c1a7ddf45125ad4ac68322f3bc3b6ec22d2091247512e9508b54cb2e2d2a85ec94874ede9d5a6353ba2df9e6bb5970c4770a8506