Analysis
-
max time kernel
169s -
max time network
180s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-08-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
664c1b4ef5e7caa17e3caa5a4bc0dcfe6fba23beb866ca8959a3791512d33798.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
664c1b4ef5e7caa17e3caa5a4bc0dcfe6fba23beb866ca8959a3791512d33798.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
664c1b4ef5e7caa17e3caa5a4bc0dcfe6fba23beb866ca8959a3791512d33798.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
664c1b4ef5e7caa17e3caa5a4bc0dcfe6fba23beb866ca8959a3791512d33798.apk
-
Size
3.8MB
-
MD5
ff0861b94469b50816dd80f3a8c5ddfa
-
SHA1
749f8aa6ab57f7c2059312e7304edecd5391cf30
-
SHA256
664c1b4ef5e7caa17e3caa5a4bc0dcfe6fba23beb866ca8959a3791512d33798
-
SHA512
76e658539bb17db06b03f6a13b7bae1b0852657cb956e8f1a365e06c01dc6ff1468b366b39e7f8a75b2edc76e0dd3979136ffe0ed8eed9343dd833b2af492a79
-
SSDEEP
98304:qKUkN1yVuEGZwi2T8fd1iNGhGQTEQu9fzdP:mk6IFqMbfXWrl
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule behavioral3/files/fstream-1.dat family_flubot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tencent.mmioc pid Process /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4509 com.tencent.mm /data/user/0/com.tencent.mm/app_apkprotector_dex/classes-v1.bin 4509 com.tencent.mm -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.mmdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.tencent.mmioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.tencent.mm -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mm -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.tencent.mmdescription ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.tencent.mmdescription ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Performs UI accessibility actions on behalf of the user
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4509
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD55c58194c9290a3da97069125c255cddf
SHA1a4f1b797dc3dccd81f30ff6fbac1cbbbe997fe28
SHA2561bbade053c0a4aac93ba65af9d003c250ef2f1a19fcf01181bc7f125501ab6ab
SHA512af10fed875066ac505ea7ef1a9aba0c9e242be70013e70c37b95ba5d46beee80b3a5c3bb5dc997f2cc275e618ec19567a59c8df0a2b005fbf6e681960cb1d0cf