Analysis
-
max time kernel
124s -
max time network
145s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
25/03/2025, 10:37
Behavioral task
behavioral1
Sample
6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e.apk
-
Size
4.0MB
-
MD5
1edd97885a8a7e88694be9971ac317e5
-
SHA1
64c4b39176709a7fa9be936b925b17fb53544da9
-
SHA256
6a03efa4ffa38032edfb5b604672e8c9e01a324f8857b5848e8160593dfb325e
-
SHA512
2aa25bae46e2c3f1ebdd2360c378f711ebc40fe82f9541d6a52d48f3ee14f46801a7125d6b02afdeaa342dfd96b6b22017cf7011e81fad749ce864b1703a077a
-
SSDEEP
98304:s5knISHh3FZNqsf44bTUIYiFZBrzXUpBJ1FS3VfTvOGn/Ms:oknhlj7bUIYi5rzXUbJ1FS3VOGn/Ms
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_flubot behavioral1/memory/4334-1.dex family_flubot -
Flubot family
-
pid Process 4334 com.weico.international -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.weico.international/app_apkprotector_dex/5xae4yYD.aws 4334 com.weico.international /data/user/0/com.weico.international/app_apkprotector_dex/5xae4yYD.aws 4361 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.weico.international/app_apkprotector_dex/5xae4yYD.aws --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.weico.international/app_apkprotector_dex/oat/x86/5xae4yYD.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.weico.international/app_apkprotector_dex/5xae4yYD.aws 4334 com.weico.international -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.weico.international Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.weico.international Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.weico.international -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.weico.international -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.weico.international android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.weico.international -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.weico.international -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.weico.international -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.weico.international -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.weico.international -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.weico.international
Processes
-
com.weico.international1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4334 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.weico.international/app_apkprotector_dex/5xae4yYD.aws --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.weico.international/app_apkprotector_dex/oat/x86/5xae4yYD.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4361
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5b1d614416713cac32114408e34bf65f8
SHA16d359cdd25d13b7e407c60301ceec5d276b3580c
SHA25643aeff13359ef7e32a451cd4b92c92a0fe1e1379529908da360ad52ab536edee
SHA512ef8b04cd045b89ef6ad4e1ecffa8dd45e7c7adc9a35e1f9648c13bc6c3fa1b916ef8fc592990806755801df460932c128a49836962d5a614858e3c695625786f
-
Filesize
2.7MB
MD5211744d04185befb1fe3cc2ecb18bda0
SHA140c7be59289933027008f8c8641e96b0225b9307
SHA25675cf04cb3e7a6bc892becd152cb8d9bad274f4105361c3b03e6fcd7c9bffdb79
SHA512052821d79614f4380ca774b39255e4dbe578db0681666fc0db4b44db61d959e31d5f8cf5c34ac87da966b632c3e1dcf1a2de34c889b87a993671443207a3ad6f