Analysis

  • max time kernel
    58548s
  • max time network
    157s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    26-11-2020 07:36

General

  • Target

    wWqZwMmEcRmQyKlD.apk

  • Size

    218KB

  • MD5

    09224eddb4ad4ee2fc1e152a46fb18fa

  • SHA1

    6b49da56b437861766ab79370620b54d2e7343f1

  • SHA256

    4b2ecd484e8e025839b08d9841d552084db602dc12fb91c7e7470f3352531278

  • SHA512

    b653d471fd01fda661d3c2e97e4001a3366742ba498281191889f32542cd11c89cad853510a9ee7e8830a81b3d1c8479aa6ed73685f785508586cfab9176050c

Malware Config

Extracted

DES_key

Signatures

  • XLoader, MoqHao

    An Android banker and info stealer.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator 1 IoCs

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
  • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages 2 IoCs
  • Suspicious use of android.net.wifi.WifiInfo.getMacAddress 21 IoCs
  • Suspicious use of android.os.PowerManager$WakeLock.acquire 1 IoCs
  • Suspicious use of android.telephony.TelephonyManager.getLine1Number 58 IoCs
  • Uses reflection 62 IoCs

Processes

  • rjtx.pnhmj.fwszw
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads name of network operator
    • Uses Crypto APIs (Might try to encrypt user data).
    • Suspicious use of android.app.ApplicationPackageManager.getInstalledPackages
    • Suspicious use of android.net.wifi.WifiInfo.getMacAddress
    • Suspicious use of android.os.PowerManager$WakeLock.acquire
    • Suspicious use of android.telephony.TelephonyManager.getLine1Number
    • Uses reflection
    PID:3551

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads