Analysis

  • max time kernel
    3933838s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    28-12-2023 14:45

General

  • Target

    e4d506940fad3af243ac3eb04e16f6a9.apk

  • Size

    3.0MB

  • MD5

    e4d506940fad3af243ac3eb04e16f6a9

  • SHA1

    0c6ba3fac39eab343539e2355bb0b533665b7ea6

  • SHA256

    7a1f67937c3df8b1b65b7e5ca2ac609a7f405123df91b948535ad866e9ff884d

  • SHA512

    19ecfa32e9e21cd65bc9579a8ef449f2b9fa883a22884ecc561586f9dd327aebe485a178128af2ed34270d51fffb5e754618ee22e0cd6e931bf09818060a2bec

  • SSDEEP

    49152:0gdipryDHH0D6gmPOroTV8asMbUCWhSENwOU1iNcJ3W7HxTQqUonXJ3cwk:0brWn0DAOroTV87wHDOC09RzUsFk

Malware Config

Signatures

  • FluBot

    FluBot is an android banking trojan that uses overlays.

  • FluBot payload 3 IoCs
  • Makes use of the framework's Accessibility service 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Loads dropped Dex/Jar 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.xunmeng.pinduoduo
    1⤵
    • Makes use of the framework's Accessibility service
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4253
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/oat/x86/xCSswjlO.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4279

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king

    Filesize

    58KB

    MD5

    608126300cb2a309f213b1a82907f42b

    SHA1

    6b9f6718fd6114dc5bfa550b6f190ce6deedf421

    SHA256

    60066959c180e1ab9021819e8385fe7b3cd3ff318f6b9dd13b854471391861c3

    SHA512

    dbfb5ed63d393edcb816c268fd2234729a96ef29dbeea270072227b9334b3f25548945fc6ae4824bef90044e952f43c197cd702f6578b7ff59242b0b60414b0b

  • /data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king

    Filesize

    2.4MB

    MD5

    5b49441a9350dd3b4dba093b8faa2c8e

    SHA1

    bbe36075bd706b87eb7f96fc498c83088b717226

    SHA256

    c23491993bd680fa89ca42a5ff0695365e07c83874e4db29b96234d8a21fe10d

    SHA512

    e4ce7f58ed24644094dee157d4e364c9bd4d68507bac760c760695dc2280052914bfeeb2c020f53b4e9e5da75e173bba28fd994176a4cea66d79a0e648279f94

  • /data/user/0/com.xunmeng.pinduoduo/app_apkprotector_dex/xCSswjlO.king

    Filesize

    2.4MB

    MD5

    3295dbeea222279d227a2c3cab5d99ca

    SHA1

    a8cdf90f561932d3c4d731df6bf659229488167b

    SHA256

    c6c265e23b50e5375c9e67b27da8bb36ada0f10840a2881720ef4f3314abd6f8

    SHA512

    27a15346ee73a817fcbcf6a80c4c576e91b74d2f0141a11fe11a5be8cd94482e3597a54e0277475b420702ca064d02422bff3adc9d702215a8f59a1d01ffea00