Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
02-09-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c.apk
-
Size
5.4MB
-
MD5
c06aa910841cf4c7f020b9a6f30663d3
-
SHA1
39f8fc6e4ad8f3fbf6d26542dae6ef704be42a0c
-
SHA256
cc088e5ca8277a42cd0cfa14988d8af0f69194c5808a0d8cb33aada333e92f6c
-
SHA512
899067119bd7918b5e98779ac6367f17fdc53c1d62aecad164c504b338c974adaf46d7055fc68c69d881144ea263972dd77392d4059b123b697e16c5b0dc76c2
-
SSDEEP
98304:bg6Bvfymd5SsncjHaX642ziJO+k0Z51iMvmHj1gDOQntmsS8yU2Kac6ur2ftPQ/S:E6Yms+K42sdDZ51NSgi6tvkcsft2S
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 family_flubot -
Processes:
com.tencent.mobileqqpid process 4253 com.tencent.mobileqq -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/oat/x86/base.apk.i8Gyfke1.odex --compiler-filter=quicken --class-loader-context=&com.tencent.mobileqqioc pid process /data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 4283 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/oat/x86/base.apk.i8Gyfke1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 4253 com.tencent.mobileqq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mobileqq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mobileqq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mobileqq -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.tencent.mobileqqioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mobileqq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mobileqq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mobileqq -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tencent.mobileqq -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.tencent.mobileqq -
Requests changing the default SMS application. 2 TTPs 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.tencent.mobileqq -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mobileqq -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mobileqq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.tencent.mobileqqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tencent.mobileqq
Processes
-
com.tencent.mobileqq1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4253 -
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/base.apk.i8Gyfke1.fy8 --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/oat/x86/base.apk.i8Gyfke1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4283
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.tencent.mobileqq/aGfkkfgGg8/ekjFyfg8aTgTsIg/tmp-base.apk.i8Gyfke1558273848137291886.fy8
Filesize939KB
MD5c89fe90317ff9904fe5319375122176d
SHA1afd32622b194247bac1f95e87e0a4568d329b0f4
SHA2568bda2b9d3f7ad15a64aa8116c7dd8df32137280b6d8b297ad40328db071bef49
SHA512b511b479754019a73fdd7e8560ef21f2fdb96735889e473937a0a68314fc29f329edfc76458c27229eb91079f882002cb07391948b9216f45c1c2b76f357f6f7
-
Filesize
2.1MB
MD5edd35d9d7f478c0d26a64eaa13613942
SHA127b4c8b7ea51aacea262385dd628806f16eb4a8d
SHA256a8f26e5f12d32575322c7cd5c7ae8a17431abf140eb3a4b2c033912f9d65b728
SHA512edb00e5572d7ba3c43741ce0f1fb5ad3b261fe798962603a61f4e1493bdc0ac850b146450e2db3bc4e902015d8e133575a9d79813d4a452cdff69839e5502372