Analysis
-
max time kernel
152s -
max time network
163s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
03-02-2024 01:44
Behavioral task
behavioral1
Sample
8b116440dae67d7a258c225fd7770bfd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
8b116440dae67d7a258c225fd7770bfd.apk
Resource
android-x64-20231215-en
General
-
Target
8b116440dae67d7a258c225fd7770bfd.apk
-
Size
3.0MB
-
MD5
8b116440dae67d7a258c225fd7770bfd
-
SHA1
975d318bc82096c586913654e9f15ca643cfabd7
-
SHA256
7dcb4c377eebc1d4c5efd5ef873d9d82fc0dcf1ed1ec7ce9884ca09341fc012e
-
SHA512
b3f64e1532f030988daef21287fd52f9d1abf9a3fcad8eb5e8edbcabd47c1d413259b00f5c409221ded18ba66c5639df13245438369f5bbf20094fffeedc559e
-
SSDEEP
49152:nhyfByEPmieQpAkKKhMpMbKT1SooNrxHauzZ6Fe5K+xmXzoJHNwy8z3RQQi:nuyE5eQpZh3boojHauF4eY+cyyBi
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.sina.weibo/app_apkprotector_dex/YNF53gHa.peace family_flubot /data/user/0/com.sina.weibo/app_apkprotector_dex/YNF53gHa.peace family_flubot -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.sina.weibodescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sina.weibo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sina.weibo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sina.weibo -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.sina.weiboioc pid process /data/user/0/com.sina.weibo/app_apkprotector_dex/YNF53gHa.peace 4606 com.sina.weibo /data/user/0/com.sina.weibo/app_apkprotector_dex/YNF53gHa.peace 4606 com.sina.weibo -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.sina.weibodescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.sina.weibo -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
com.sina.weibodescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sina.weibo -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
com.sina.weibodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sina.weibo
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5f005a826d0b0f2aeb4f40b10d9e4b29d
SHA12f124740ea7126a9e9bcef4b45bc0b8e5324cbbf
SHA256b2bb10a17f3f3102620b0ed5bf84489d8eb22282a55d1d7a664ebcfe162f874a
SHA512240ab24ef5524aaea27fa0596cecf5649b946a607a9822c49496028e695db2917c4c91b67fd14d32c9fe91822ae497dfb55883074d4a2147c16ce4aa9090827b
-
Filesize
2.4MB
MD5dae833e9d575c7512c7d7b78ac3716a4
SHA1b31cb114f2bf8754915375d3551dd34b1edee59d
SHA256a979babac04109cb607b3e4e3844b06b5d2ae5044b9543a2e2fee1f40658209b
SHA512daa982b9d9eb6951ade81ed1e26ab35c4f5d76929629f8c30a6440ff84dfa7044e78baec8a0d2d608fa6032b8065925710f7210f439385edb00bfc4647326e78