Analysis
-
max time kernel
4030950s -
max time network
165s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
09-01-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7fab5ee06a6a5cc391b8b0e94b44bd253eb59e90fda924662534951dc21c9d67.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7fab5ee06a6a5cc391b8b0e94b44bd253eb59e90fda924662534951dc21c9d67.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
7fab5ee06a6a5cc391b8b0e94b44bd253eb59e90fda924662534951dc21c9d67.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral4
Sample
vk_dex.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral5
Sample
vk_dex.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral6
Sample
vk_dex.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
7fab5ee06a6a5cc391b8b0e94b44bd253eb59e90fda924662534951dc21c9d67.apk
-
Size
4.4MB
-
MD5
b718f106e9085c2efe48ad20f475b9f4
-
SHA1
259aa2501a02f400fff56dd7f02d4b300846ce82
-
SHA256
7fab5ee06a6a5cc391b8b0e94b44bd253eb59e90fda924662534951dc21c9d67
-
SHA512
744f7dc20b23b5dbcb3ed43a70ed6f0505bb3afa1c2615928b2439c9d15da68b7fc9e5c4965daacc109bbaa4bf907ba429a86d9dccb04fba6a6bdc4041b64449
-
SSDEEP
98304:AkBUI5nk4YRl0wLpqPOJu5uIA1Ima4X6H0jJWnfrXnvfMD43W3sAu:AYUIiZhYPGuQj6HasHME39T
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.weishi/wkijhhz9sh/okeizeuv4kh8udi/base.apk.eferhie1.wnu family_flubot -
Makes use of the framework's Accessibility service 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.weishidescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.weishi -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.weishiioc pid process /data/user/0/com.tencent.weishi/wkijhhz9sh/okeizeuv4kh8udi/base.apk.eferhie1.wnu 4617 com.tencent.weishi -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.tencent.weishidescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.weishi
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD52fc80a341e50499c6463d7eeb63c650d
SHA18d23e240ecce9cab95ddd4e131c2832462c2672b
SHA256e23b74134415ebdc2d4df2d93eb5ee45fbd6491ea994c1f735fce0aba741c6d3
SHA5126f1f8c5500f78fc3d2116250db13534f2de74533cba91895c203af6f926679feace03a89fd2b5d0dcdf4f73db8bee1396bcf02f519bbe0420963153c55e5c4db