Analysis

  • max time kernel
    2694950s
  • max time network
    158s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    23-12-2023 19:19

General

  • Target

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk

  • Size

    6.8MB

  • MD5

    7a9a3c3c37885357227fb211984bbd40

  • SHA1

    8046275ad75ef2bdbf1f21f6c64d36563d5b06f4

  • SHA256

    76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252

  • SHA512

    f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499

  • SSDEEP

    98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot payload 2 IoCs
  • Makes use of the framework's Accessibility service 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.tencent.mobileqq
    1⤵
    • Makes use of the framework's Accessibility service
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4255
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/ycKc.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tencent.mobileqq/app_DynamicOptDex/oat/ycKc.json.cur.prof

    Filesize

    1KB

    MD5

    92e8567f0d3829d39893fe1b48be0232

    SHA1

    26a07a5949a6bb0b8971fdbb056716cfbed37a17

    SHA256

    d6ff95c15d17e216dc1f2b12ba71421dde060b3a56b3b74ca74e5cff89708287

    SHA512

    d6b7a620f56d36811c3e540af8bd32c64e892f7f628b0181f31b4af255ecb2279c17fba6db241949481bea02e6641a1899affdf6bc6ff7d48ba1ed5ddc3aa0d2

  • /data/data/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json

    Filesize

    3.1MB

    MD5

    60c429c92b31cf2056b6b34a23762e5b

    SHA1

    5ce0b38b8a52c47002d21e32a7ac0a01e4c561c0

    SHA256

    5560970a6a5de549ccd9e28b851a5ee218449097b30e06529c6ea0fabd6f842a

    SHA512

    951c2286ab0e2824ab0dc5d5b21a7bfd8a4880ba9b53b8bb59e73ab2edf6797abdbd429110b18d48d4335111ac538436e38376339ab1aa526eb849f16d6529df

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json

    Filesize

    3.1MB

    MD5

    ad8465c129549af17e79674174d034f0

    SHA1

    68d7f89e3f976b5ad66fcf9eb9b881259a41c8fb

    SHA256

    41dd1e6416de4f990cfbc24ad3d9dc6bf830d2028adff42202bc5587fbf4c668

    SHA512

    84f87c7f23c9e73d342ef5aca9bacf25dcce00d1b76c38d01b2678cf72c82689a62e41adfc77060d80e170ea8aece7022bc407c5f38065c7f4873f14de9df29e

  • /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json

    Filesize

    3.1MB

    MD5

    e0ce873a45d32bd641a0a4981e46fbe8

    SHA1

    f5970c914d369b828ca047d7a82c09167718c85f

    SHA256

    6f28b5814816ab869a28068f78811a555fb51d6e686ead3241a5827be5fb708b

    SHA512

    6ab787cfab7a19aca2d9d6e5b216fb57922d394afb830cd627b44a9a0b1d914f813b5a69ff712609507e97203f2c9aeb2b5aa1bf01275b17ece3f84ac06f6ac9