Analysis
-
max time kernel
179s -
max time network
189s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02-08-2024 22:00
Behavioral task
behavioral1
Sample
99c5761821b972db3e8a5e978c1cbf5a92e92f7fac6091a74971e30a94774551.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
99c5761821b972db3e8a5e978c1cbf5a92e92f7fac6091a74971e30a94774551.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
99c5761821b972db3e8a5e978c1cbf5a92e92f7fac6091a74971e30a94774551.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
99c5761821b972db3e8a5e978c1cbf5a92e92f7fac6091a74971e30a94774551.apk
-
Size
4.0MB
-
MD5
e8a3611b7f1bb15328d3ca13b2589cd3
-
SHA1
9cff80ef019b251edd3a2ec7a868b329ca224961
-
SHA256
99c5761821b972db3e8a5e978c1cbf5a92e92f7fac6091a74971e30a94774551
-
SHA512
39a98508c524e6143abf01f5edf8025abcdb881d0fe0c4a7539839bc0dcdafb58acb51aed25851a57e0cd28419c9268e60035be1857b744208559321965461df
-
SSDEEP
98304:hJ1zRsMfxiDityT1xjaN845Y0xthAYnVXpVbRzTULQG8bLi:/1ViuG1h45/xTNXpVpQLQlbe
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_flubot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/p713405ee.p7b32cbd4.p14173c2c/app_apkprotector_dex/j7yoe9DS.shs 4956 p713405ee.p7b32cbd4.p14173c2c /data/user/0/p713405ee.p7b32cbd4.p14173c2c/app_apkprotector_dex/j7yoe9DS.shs 4956 p713405ee.p7b32cbd4.p14173c2c -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId p713405ee.p7b32cbd4.p14173c2c Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId p713405ee.p7b32cbd4.p14173c2c Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText p713405ee.p7b32cbd4.p14173c2c -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground p713405ee.p7b32cbd4.p14173c2c -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction p713405ee.p7b32cbd4.p14173c2c -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo p713405ee.p7b32cbd4.p14173c2c -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal p713405ee.p7b32cbd4.p14173c2c
Processes
-
p713405ee.p7b32cbd4.p14173c2c1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Uses Crypto APIs (Might try to encrypt user data)
PID:4956
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ea9c2431c419be4190cfa6e469163539
SHA13b4319b6e59e1a93cb5a696f7bfac5f6d2de050f
SHA256c7a7cee30bf7e6769639ebf4fed7add4bcbce3584d66768b88d722c485a57fdf
SHA512aba2d8bcf1bc417fb00a6a2fee86d28f53aeac29ec458365d5fd7a0cf52c007804dcf8acade74b309403d84e780a9cb7444f0802bc4dde0f273f51bbd2b1c1ea