Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
07/03/2024, 10:14
Static task
static1
Behavioral task
behavioral1
Sample
53721f5f5eb05250b7d7e599983dc34d2ea2061e8032d4be8fcf9693452757a3.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
53721f5f5eb05250b7d7e599983dc34d2ea2061e8032d4be8fcf9693452757a3.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
53721f5f5eb05250b7d7e599983dc34d2ea2061e8032d4be8fcf9693452757a3.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
53721f5f5eb05250b7d7e599983dc34d2ea2061e8032d4be8fcf9693452757a3.apk
-
Size
3.3MB
-
MD5
b670a3277e69ff3f6aa23c0116675cd9
-
SHA1
f7a6aab778d3a3a348cbb329ef32ed3c492c1ea8
-
SHA256
53721f5f5eb05250b7d7e599983dc34d2ea2061e8032d4be8fcf9693452757a3
-
SHA512
72062267c183060db58f21af96a6d8350cac37b34e85d523576b3a6000d14e515547c57916452b11d4a6370a3e0e4377a80a556956944c9f909e2ba427f2d80b
-
SSDEEP
98304:B0zGt3ZuI7y690JAD/oD4/mQs6/LTdCHZs:B+GfuI7y2oDrq
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
resource yara_rule behavioral1/memory/4348-0.dex family_flubot behavioral1/memory/4316-0.dex family_flubot -
Makes use of the framework's Accessibility service 2 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.qqmusic -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/base.apk.classes1.zip 4348 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/base.apk.classes1.zip 4316 com.tencent.qqmusic -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.qqmusic
Processes
-
com.tencent.qqmusic1⤵
- Makes use of the framework's Accessibility service
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4316 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/base.apk.classes1.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tencent.qqmusic/code_cache/secondary-dexes/oat/x86/base.apk.classes1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4348
-
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.tencent.qqmusic/code_cache/secondary-dexes/tmp-base.apk.classes6605361821610972430.zip
Filesize339KB
MD59048149fe991f5271d80f03308ce8d3d
SHA14bcb5989949f3fb6c5db4570d1dc601a8ea01d21
SHA256f46a9a4deb99d0ddd0af136f18426406d70c0740928e970ec8f8eba9f74aaed6
SHA5127834b8635b4ff49430ccecb9a4d38ffb6aac497e18b925f830f997f499ff3020bef3f076bb3258a160e51e605f03ff4d45f7785471f4b9307f5cfde7765087e8
-
Filesize
2.4MB
MD527379556444fc08020692572e967528e
SHA1e98aba77f9fabaeed582c6b52de050f010a5b49f
SHA2563ccfc2d60ce8334446368ffb790a5b523cb1c3a21a1d15b75d50cf2084fb7fd9
SHA512f8f36bcf84119169d721082de6ad14fdb76368a0f85862e02b6595b6c806cdbb05d5878f7f2af46bcea465f50c9957b0ea7375796167a2131634f64a1ddd6626
-
Filesize
2.4MB
MD58ea2dc64e9e7a2740c3e5effe242615e
SHA139882a484ee4dbb7ef46554893ce7822b5656eb1
SHA256d52975758f8799644df1ab42958abe05c3cbb3bd2b436d4ec5c18c2961747300
SHA512d598e0cd00e0cb25d3a6db7d9ca4226929f843647ccd08dacc0ff40d842d6dfbc3cb00760692787f21cc178d1b76c4ae1db67f44ff7615c66c6f46b705108390