Analysis
-
max time kernel
40s -
max time network
46s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02-09-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
60fe45472b87bb261930e74422c7a9b5.apk
-
Size
4.2MB
-
MD5
60fe45472b87bb261930e74422c7a9b5
-
SHA1
742334d1697c73d5c7a6621a5f278c397afdfe14
-
SHA256
5c9057d6d19f82fbba255d58e9b0da7102fed08ee25e548e08f0a5b22efc42a2
-
SHA512
5acbdf22b276db4a9848c8153b008026df6cff40f26097967696e2c1ca3c5e12a723ca34ec8b055f10da2e549fb74db2947d85e294527f8a7a65331475cf73ea
-
SSDEEP
98304:5mhzX3DSNLLs4iqrwDn0pFartCVTbBRrQDjhCIwhErEwS1H:sFX3+pCY5PaR2yjUIHrzS1H
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_flubot behavioral1/memory/4312-1.dex family_flubot -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json 4312 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json 4337 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/Ng.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json 4312 com.tencent.mobileqq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mobileqq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mobileqq -
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mobileqq -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.mobileqq -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.tencent.mobileqq -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.tencent.mobileqq -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mobileqq -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mobileqq
Processes
-
com.tencent.mobileqq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
PID:4312 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mobileqq/app_DynamicOptDex/oat/x86/Ng.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4337
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56b29e9919853e01c16472187366b6e40
SHA1129bb8877b6dc976abea1c63f75d7f869a31644a
SHA256fcfc51132cdb215bfff7d1256ccbd2fed09340bcb9a90ecedd7fe1fade66e65b
SHA51264aab54c5cf04afbab4fc11e4c86ca58279e0ddab86d5af7875d0fe4839b8c7e72745fc8364b4447b51c781d58cd1329a70d7a57d3030c02fc310bee452d6af4
-
Filesize
1.5MB
MD5c76a33c8c0cad41b82d0d8d6e88ec7ac
SHA1ed844413b06f6e2fbba087cd8dfee9ce0d36b815
SHA2562b5330a23d4fa7031d0d90e3146ec674d2353b25476d259c9d34ad429005fed8
SHA5123e19d1ccdb5857a5f87092039f3d7a88e4655d4db53419b6e516a55baf594775bc0d44755df9d15f330b337638e5226c303096e75f664fcad4f5bf14bf03df68
-
Filesize
1.5MB
MD586cd96725583f69c80a8b7e6862043e9
SHA169d058b75f20b1373586f854d1abc4dc69a960fc
SHA2566652a981138fad26ca532c28234695ee549b22516bd034c01d66c998760183bd
SHA512a46f5aeb145b8d288537c4effa5505d5783e9c286cf1c0ebff931edba774bd06ca276bdedda5e30d34354d915e7522a7497f468f54157705097e832debf3f740