Malware Analysis Report

2025-01-19 04:57

Sample ID 220123-kh3lxaffcj
Target 14e67b92c8a44a45ecff3334fb6f1dba3466642177bb8fb20f39482c79d56e91.apk
SHA256 14e67b92c8a44a45ecff3334fb6f1dba3466642177bb8fb20f39482c79d56e91
Tags
xloader_apk banker infostealer ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

14e67b92c8a44a45ecff3334fb6f1dba3466642177bb8fb20f39482c79d56e91

Threat Level: Known bad

The file 14e67b92c8a44a45ecff3334fb6f1dba3466642177bb8fb20f39482c79d56e91.apk was found to be: Known bad.

Malicious Activity Summary

xloader_apk banker infostealer ransomware trojan

XLoader Payload

XLoader, MoqHao

Requests dangerous framework permissions

Loads dropped Dex/Jar

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-23 08:36

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-23 08:36

Reported

2022-01-23 08:39

Platform

android-x86-arm

Max time kernel

2249673s

Max time network

157s

Command Line

wzb.hdhyq.gppiq.tpc

Signatures

XLoader Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

XLoader, MoqHao

trojan infostealer banker xloader_apk

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/wzb.hdhyq.gppiq.tpc/files/d N/A N/A
N/A /data/user/0/wzb.hdhyq.gppiq.tpc/files/d N/A N/A

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

wzb.hdhyq.gppiq.tpc

Network

Country Destination Domain Proto
US 1.1.1.1:53 alt3-mtalk.google.com udp
SG 74.125.130.188:443 alt3-mtalk.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 m.vk.com udp
RU 87.240.190.67:443 m.vk.com tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:53 storage.googleapis.com udp
US 172.217.168.208:443 storage.googleapis.com tcp
US 1.1.1.1:53 storage.googleapis.com udp
NL 216.58.214.16:443 storage.googleapis.com tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
US 1.1.1.1:853 tcp
KR 45.114.129.50:28877 tcp
US 1.1.1.1:853 tcp
NL 172.217.168.195:443 tcp
NL 172.217.168.195:443 tcp
NL 172.217.168.195:443 tcp
NL 172.217.168.195:443 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp
KR 45.114.129.50:28877 tcp

Files

/data/user/0/wzb.hdhyq.gppiq.tpc/files/d

MD5 d7f0257d31574b862af05971f883fae0
SHA1 252b1b03017de80d8fd70907cda39ce2bfadaddc
SHA256 765119852dc93c3a5d397cbaa167ac148856dba9773062626ed4aeb9674f860c
SHA512 3a53daaa693c0ee6904d737850d490a40035454931cebdbba865cefcd97df58e0c72e2ac33bbd4c1445f5d056193e81f113c0862d93acecbe74a0bcaa362eac5

/data/user/0/wzb.hdhyq.gppiq.tpc/files/d

MD5 d7f0257d31574b862af05971f883fae0
SHA1 252b1b03017de80d8fd70907cda39ce2bfadaddc
SHA256 765119852dc93c3a5d397cbaa167ac148856dba9773062626ed4aeb9674f860c
SHA512 3a53daaa693c0ee6904d737850d490a40035454931cebdbba865cefcd97df58e0c72e2ac33bbd4c1445f5d056193e81f113c0862d93acecbe74a0bcaa362eac5