Analysis
-
max time kernel
179s -
max time network
191s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-08-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
b421cc0f878b4ed4a2e535d1e9d9e6ffd3c6b822b55e701bc137c2360fd5e7ee.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b421cc0f878b4ed4a2e535d1e9d9e6ffd3c6b822b55e701bc137c2360fd5e7ee.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b421cc0f878b4ed4a2e535d1e9d9e6ffd3c6b822b55e701bc137c2360fd5e7ee.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b421cc0f878b4ed4a2e535d1e9d9e6ffd3c6b822b55e701bc137c2360fd5e7ee.apk
-
Size
3.2MB
-
MD5
3bb9ad5acdbe20df21068ad42801c30d
-
SHA1
20a654d79cc6e5a6209f001601288b2209f54082
-
SHA256
b421cc0f878b4ed4a2e535d1e9d9e6ffd3c6b822b55e701bc137c2360fd5e7ee
-
SHA512
637535aa3034a425c40b3ef428ff51e3bd360e7a4317716887cc19e0755930ad22836dd8b7dc0fbfca977dce58342571ee15c1df8397c00e9bfcc24d9e502e6e
-
SSDEEP
49152:uYzaaObrX+7P0Fv7f0r9oj/tOLW93L2WhOhzOGNwNUWAvNDT66NnlqIbXob3GoO:uPbrO7P0FgGjEO3QyJNUxV1DqAVoO
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
resource yara_rule behavioral3/memory/4482-0.dex family_flubot -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qq.reader/code_cache/secondary-dexes/base.apk.classes1.zip 4482 com.qq.reader -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.qq.reader -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.qq.reader -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qq.reader
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5e8170ac6d96755570012d752a213969b
SHA186c14c3e8c46de00b21738447b326f3bc53d9582
SHA25616c7fccdd1eb8b489943a98dd26d3448fe49a8cdd000de295f5b1c9d9139f6dc
SHA5120c12ef816e7686000ec6d783155093b8dcecc3013c59882564c600b76d0f72d86f2eb4ee3c72954af9f11fad219dcdbd5d3d7327ca550f81efa40acf5a1ce492
-
Filesize
859KB
MD511623a9652d49007d0decc3589a32ebf
SHA14176835f8291859b5e511059bd85b1cea92f0e88
SHA2569dfc548902590afe5014af37ff98e1d06f346b62f247f1bd6129967d964ad033
SHA512e935bbb356e556d1d75145224131e4686ac5c1188ddf66ccb7807acb00905492845b93a6665848938ab01e009bdd3d00347f1aca6117ac776a109002940d0360