Analysis

  • max time kernel
    4007374s
  • max time network
    158s
  • platform
    android_x86
  • resource
    android-x86_arm
  • submitted
    22-11-2020 07:27

General

  • Target

    iJjTgLzYsFgDrRy.apk

  • Size

    218KB

  • MD5

    bfa8485aba16ecca0ad2504f27ff46b5

  • SHA1

    a7e7a0d42d7e5635e803c0f913565fc93e714ebc

  • SHA256

    5c3126752ea0c6d395b2c73ddb75e20c7719feb685b8082cbc00ff41665013f3

  • SHA512

    6672533bd45e578000cbbbfbe97027e33990f09446a67e9960bd4c2788862aa8af810d54270d617508a8fcb09f32694524818fa60524492abb96271b29b5fd1e

Malware Config

Extracted

DES_key

Signatures

  • XLoader, MoqHao

    An Android banker and info stealer.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 13 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 58 IoCs
  • Uses reflection 64 IoCs

Processes

  • exmr.rczlk.yigkg
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:4099

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads