Analysis
-
max time kernel
135s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02-09-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
60fe45472b87bb261930e74422c7a9b5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
60fe45472b87bb261930e74422c7a9b5.apk
-
Size
4.2MB
-
MD5
60fe45472b87bb261930e74422c7a9b5
-
SHA1
742334d1697c73d5c7a6621a5f278c397afdfe14
-
SHA256
5c9057d6d19f82fbba255d58e9b0da7102fed08ee25e548e08f0a5b22efc42a2
-
SHA512
5acbdf22b276db4a9848c8153b008026df6cff40f26097967696e2c1ca3c5e12a723ca34ec8b055f10da2e549fb74db2947d85e294527f8a7a65331475cf73ea
-
SSDEEP
98304:5mhzX3DSNLLs4iqrwDn0pFartCVTbBRrQDjhCIwhErEwS1H:sFX3+pCY5PaR2yjUIHrzS1H
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
resource yara_rule behavioral2/files/fstream-2.dat family_flubot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json 5062 com.tencent.mobileqq /data/user/0/com.tencent.mobileqq/app_DynamicOptDex/Ng.json 5062 com.tencent.mobileqq -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mobileqq -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.mobileqq
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56b29e9919853e01c16472187366b6e40
SHA1129bb8877b6dc976abea1c63f75d7f869a31644a
SHA256fcfc51132cdb215bfff7d1256ccbd2fed09340bcb9a90ecedd7fe1fade66e65b
SHA51264aab54c5cf04afbab4fc11e4c86ca58279e0ddab86d5af7875d0fe4839b8c7e72745fc8364b4447b51c781d58cd1329a70d7a57d3030c02fc310bee452d6af4
-
Filesize
1.5MB
MD5c76a33c8c0cad41b82d0d8d6e88ec7ac
SHA1ed844413b06f6e2fbba087cd8dfee9ce0d36b815
SHA2562b5330a23d4fa7031d0d90e3146ec674d2353b25476d259c9d34ad429005fed8
SHA5123e19d1ccdb5857a5f87092039f3d7a88e4655d4db53419b6e516a55baf594775bc0d44755df9d15f330b337638e5226c303096e75f664fcad4f5bf14bf03df68
-
Filesize
2KB
MD5c13f2a1449f1cc54d5c0b8acae87f7e0
SHA1f6d3756270eb58945c077fb06c3db6f54c578313
SHA256bee48e03fa67aae00380df30cf398a3dc26a67bc9b0f15bf061679ae26e636b1
SHA512ba136ba6adadb829f92a7b1dcbc2958e82a472b834ad1dc803f539dfd12d9720098430d1d3a6960d3518199ad39023a7b288bc98992a4d0747735ffe153a4284