Analysis
-
max time kernel
147s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
20/04/2025, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133.apk
-
Size
4.6MB
-
MD5
2ef09cf7dd58f0dcc2b537abab1904f6
-
SHA1
602996d906e25b9540e56e5adc7a5d9c6daec5ea
-
SHA256
c252746bcface60fe83fdb2f31268567780c45d5886e1af8b02ccb1d65a83133
-
SHA512
47a8e5cd02e8d9e2d45a38712e496454ebbf69bdca892ac59aa5e4446ca90cedc86f29020ed1247b897fb942f14cfc08350c2a1db90b570d8456b373c5a54c1b
-
SSDEEP
98304:rNPYedT1FpVjDacKJ4qU58PcuIAJjoDrRz7uWAbDRb+BFZxyfRrsrRL:rNPYaFrOFCv8dbEdz7uWA3RbwPYfRwZ
Malware Config
Signatures
-
FluBot
FluBot is an android banking trojan that uses overlays.
-
FluBot payload 1 IoCs
resource yara_rule behavioral3/memory/4789-0.dex family_flubot -
Flubot family
-
pid Process 4789 com.snda.wifilocating -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.snda.wifilocating/gijgtUrIaG/8ffgeIgGuIffiFg/base.apk.G6IU8e71.pGf 4789 com.snda.wifilocating -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.snda.wifilocating Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.snda.wifilocating Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.snda.wifilocating -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 icanhazip.com 49 icanhazip.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.snda.wifilocating -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.snda.wifilocating android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.snda.wifilocating android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.snda.wifilocating -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.snda.wifilocating -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.snda.wifilocating -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT com.snda.wifilocating -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.snda.wifilocating -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.snda.wifilocating -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.snda.wifilocating
Processes
-
com.snda.wifilocating1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4789
Network
MITRE ATT&CK Enterprise v16
MITRE ATT&CK Mobile v16
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD596dd717225f3de5eb2bbf1c6769f96b8
SHA1b3dcc85622cb7d88d6df52772ff8dc1c3dab1735
SHA25697614be0ac9394e04d9b457ceda798f732c2431ee930a5b9cc179f00d1a079f8
SHA51284543e5372dd21d6ebae864f2bf78e0cb43a341b69dd7cb5cc3fb3f0ae0a0b9fa34b87eb94b327906cab60a908a1c8ac561bbaa09b627777bcb0cfefec15b32e
-
/data/user/0/com.snda.wifilocating/gijgtUrIaG/8ffgeIgGuIffiFg/tmp-base.apk.G6IU8e76881794567777577729.pGf
Filesize926KB
MD535fc2a98b224b7e8bfd32c8a66cebafe
SHA10daf43d519d93fe744e514edf848b5f5cdf81512
SHA256a56f5c0a1c257effe7eecf494c5797c3797a5259b2202854b9fa5a335ce36453
SHA5124c76cea3050820a3eedc8c2c50bdf0c88236904452999df4b5902e347d2bb9a24698912bf5844a2b3f132e47fd29f529402604ca471918fd294898b38c771926