Analysis
-
max time kernel
2694950s -
max time network
158s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
23-12-2023 19:19
Static task
static1
Behavioral task
behavioral1
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252.apk
-
Size
6.8MB
-
MD5
7a9a3c3c37885357227fb211984bbd40
-
SHA1
8046275ad75ef2bdbf1f21f6c64d36563d5b06f4
-
SHA256
76190371f81113c07f2a176f26e61bea82f8f55debe2915c577f4ebe1b22f252
-
SHA512
f854d84d80bed707e9252700cfc8dfdd53132a7a9e1db0a64fafc3b01568a7970e1d73c3a23f169a76ed709aef7b58988c2dff86281fbe0eb535bb7becdf9499
-
SSDEEP
98304:tRrQM+PuN/1PP1DD1P7meIS64D4YC6zo4g9ZCi74Oit3Qqv5x7vnKEZ:j+WN/19DMem04Z4Tr3Qw5dnKEZ
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json family_flubot /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json family_flubot -
Makes use of the framework's Accessibility service 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq -
Loads dropped Dex/Jar 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mobileqq/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/ycKc.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json 4255 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/ycKc.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json 4255 com.tencent.mobileqq -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
-
com.tencent.mobileqq1⤵
- Makes use of the framework's Accessibility service
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4255 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/ycKc.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/ycKc.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD592e8567f0d3829d39893fe1b48be0232
SHA126a07a5949a6bb0b8971fdbb056716cfbed37a17
SHA256d6ff95c15d17e216dc1f2b12ba71421dde060b3a56b3b74ca74e5cff89708287
SHA512d6b7a620f56d36811c3e540af8bd32c64e892f7f628b0181f31b4af255ecb2279c17fba6db241949481bea02e6641a1899affdf6bc6ff7d48ba1ed5ddc3aa0d2
-
Filesize
3.1MB
MD560c429c92b31cf2056b6b34a23762e5b
SHA15ce0b38b8a52c47002d21e32a7ac0a01e4c561c0
SHA2565560970a6a5de549ccd9e28b851a5ee218449097b30e06529c6ea0fabd6f842a
SHA512951c2286ab0e2824ab0dc5d5b21a7bfd8a4880ba9b53b8bb59e73ab2edf6797abdbd429110b18d48d4335111ac538436e38376339ab1aa526eb849f16d6529df
-
Filesize
3.1MB
MD5ad8465c129549af17e79674174d034f0
SHA168d7f89e3f976b5ad66fcf9eb9b881259a41c8fb
SHA25641dd1e6416de4f990cfbc24ad3d9dc6bf830d2028adff42202bc5587fbf4c668
SHA51284f87c7f23c9e73d342ef5aca9bacf25dcce00d1b76c38d01b2678cf72c82689a62e41adfc77060d80e170ea8aece7022bc407c5f38065c7f4873f14de9df29e
-
Filesize
3.1MB
MD5e0ce873a45d32bd641a0a4981e46fbe8
SHA1f5970c914d369b828ca047d7a82c09167718c85f
SHA2566f28b5814816ab869a28068f78811a555fb51d6e686ead3241a5827be5fb708b
SHA5126ab787cfab7a19aca2d9d6e5b216fb57922d394afb830cd627b44a9a0b1d914f813b5a69ff712609507e97203f2c9aeb2b5aa1bf01275b17ece3f84ac06f6ac9