Analysis
-
max time kernel
127s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
24/03/2025, 04:16
Static task
static1
Behavioral task
behavioral1
Sample
30937927e8891f8c0fd2c7b6be5fbc5a05011c34a7375e91aad384b82b9e6a67.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
30937927e8891f8c0fd2c7b6be5fbc5a05011c34a7375e91aad384b82b9e6a67.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
30937927e8891f8c0fd2c7b6be5fbc5a05011c34a7375e91aad384b82b9e6a67.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
30937927e8891f8c0fd2c7b6be5fbc5a05011c34a7375e91aad384b82b9e6a67.apk
-
Size
6.1MB
-
MD5
1a2a4044cf18eed59e66c413db766145
-
SHA1
4e6e9995c3792d8cbcdd8aeb762bb0a6f74cef68
-
SHA256
30937927e8891f8c0fd2c7b6be5fbc5a05011c34a7375e91aad384b82b9e6a67
-
SHA512
cc069b2cc2e3c55190b0c840d98b2f6612e7779c759a24dfd903d96a028f5375ef806c40910efb98d566cef276557dab5cba13397cedc9a1ad56c1d2e1727ae8
-
SSDEEP
98304:piRrQE87MwGC0NnlKaNzvc0j9nj1lA9wVAe0bAQfkFLv0yim:pW87Mznl1XnRlA68qj0yn
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_flubot behavioral1/memory/4303-1.dex family_flubot -
Flubot family
-
pid Process 4303 com.tencent.mm -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mm/app_DynamicOptDex/fBbBL.json 4303 com.tencent.mm /data/user/0/com.tencent.mm/app_DynamicOptDex/fBbBL.json 4327 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_DynamicOptDex/fBbBL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mm/app_DynamicOptDex/oat/x86/fBbBL.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_DynamicOptDex/fBbBL.json 4303 com.tencent.mm -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tencent.mm -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.tencent.mm -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.tencent.mm -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4303 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_DynamicOptDex/fBbBL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tencent.mm/app_DynamicOptDex/oat/x86/fBbBL.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4327
-
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD54d1af208adc4e3b48ae49a8f9bb6a3bf
SHA1c01efaade18827744ea039b365b1392574cbe11e
SHA25635f92b7fab00a5dedec023de3bd5f4bc66f317043a62bee3d47c267bc28349b1
SHA5124ac2b3c9374abbed0a8169f51965711f19461695b905c0221b51883360803521e80f5087209ec134a2b0303f13add277eef3eb8dd2173861c334d7dfde958906
-
Filesize
3.1MB
MD59176c3e392a554fec7890533a61886ab
SHA174f83c8167c59c65ad1b508055dfac445bc08c25
SHA25627ed9910cd1e4f2357df3d687bb8a375b97c1a8655cf0c30a64eff495a9b3b1c
SHA512ffc4182c020c35d5a44eaf413943115d093ed4640bf9c9fa750c8fd8c6cca8947c1ddce3581b842bdb28588ce7af829dc4e23d1cb7f0b668f5c16c21adb3cbca
-
Filesize
2KB
MD5ccad53f867a4d4e1fe6008c4e8ad1e1a
SHA1b48dc5727e85cc6b9206866f1a1a11eac9d27d89
SHA256c6d9181b8852ea0d53cb83703604eb10979d4bae18c71f5075ba63ce47ba819e
SHA51273e355f5c3d800c0a2161934df70975f0bcab8900985227c14bf0139233313c2f80440af673af9d67ba9054ab989cd7bc0d9c6552d30b5e30cce31a135ff831b
-
Filesize
3.1MB
MD5e8b100462913641b3b3ff92e25c28952
SHA1b6f14c00f93608112d45b67cee5b8b981e575785
SHA256863a1018014257e0c569c7217dccbd5d810f236e2bb9ffaee02a7e9b3b006437
SHA5127524ee74a85dfa1c8c4488618e73e56d9e24db1bf99bd03fcea053cbe5c5a26340d1acf0a6d7cac0714e794544b1b551265e8db0176c5d5aa497856f28659974