Resubmissions

11-03-2021 15:08

210311-bfcvhk2we2 10

07-12-2020 07:26

201207-xrcftba5rx 10

Analysis

  • max time kernel
    567789s
  • max time network
    156s
  • platform
    android_x86_64
  • resource
    android-x86_64
  • submitted
    11-03-2021 15:08

General

  • Target

    dAdYrNg.apk

  • Size

    218KB

  • MD5

    cce6059446540919706260279c204608

  • SHA1

    8aa0055a0d8c782204dbaccfc99545d2eb89d67d

  • SHA256

    7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d

  • SHA512

    b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d

Malware Config

Extracted

DES_key

Signatures

  • XLoader, MoqHao

    An Android banker and info stealer.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Uses reflection 64 IoCs
  • 64 IoCs

Processes

  • yljl.ezlfo.eahln
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Uses reflection
    PID:3561

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads