Malware Analysis Report

2025-01-19 04:56

Sample ID 220207-q31kyacfa6
Target 30bdf42374a5bb6a83be08f9667e0a9395e411f911dab08d9c0814d30fb0e260
SHA256 30bdf42374a5bb6a83be08f9667e0a9395e411f911dab08d9c0814d30fb0e260
Tags
xloader_apk banker infostealer ransomware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

30bdf42374a5bb6a83be08f9667e0a9395e411f911dab08d9c0814d30fb0e260

Threat Level: Known bad

The file 30bdf42374a5bb6a83be08f9667e0a9395e411f911dab08d9c0814d30fb0e260 was found to be: Known bad.

Malicious Activity Summary

xloader_apk banker infostealer ransomware trojan

XLoader Payload

XLoader, MoqHao

Requests dangerous framework permissions

Loads dropped Dex/Jar

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-02-07 13:47

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-02-07 13:47

Reported

2022-02-07 13:50

Platform

android-x86-arm

Max time kernel

3564330s

Max time network

161s

Command Line

dbsdlx.ubbt.cplua.lsund

Signatures

XLoader Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

XLoader, MoqHao

trojan infostealer banker xloader_apk

Loads dropped Dex/Jar

Description Indicator Process Target
N/A /data/user/0/dbsdlx.ubbt.cplua.lsund/files/d N/A N/A
N/A /data/user/0/dbsdlx.ubbt.cplua.lsund/files/d N/A N/A

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data).

ransomware
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

dbsdlx.ubbt.cplua.lsund

Network

Country Destination Domain Proto
NL 216.58.208.106:443 tcp
NL 216.58.208.106:443 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
NL 216.58.208.106:443 tcp
NL 216.58.208.106:443 tcp
US 1.1.1.1:53 alt3-mtalk.google.com udp
SG 74.125.200.188:443 alt3-mtalk.google.com tcp
US 1.1.1.1:53 m.vk.com udp
RU 87.240.190.78:443 m.vk.com tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
US 1.1.1.1:853 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
US 1.1.1.1:853 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp
KR 61.97.248.5:28836 tcp

Files

/data/user/0/dbsdlx.ubbt.cplua.lsund/files/d

MD5 1becc430c1ece0ef2cdffd70defb66f2
SHA1 55dca9ec32434e814b49a2f11a20a66ee2617033
SHA256 9195c1021cec5b6f9d836442ee88bd7d3efcc0a5e07a041d054f7c90399e64d7
SHA512 156294cb3e3da353a5f3459d9cb1d8c7fe3948661f2202a18473f7c0447a99bc02afd5aa5ee6dc14dc07143e082288c7b89c4528a84fe88300aa46e35ea1181a

/data/user/0/dbsdlx.ubbt.cplua.lsund/files/d

MD5 1becc430c1ece0ef2cdffd70defb66f2
SHA1 55dca9ec32434e814b49a2f11a20a66ee2617033
SHA256 9195c1021cec5b6f9d836442ee88bd7d3efcc0a5e07a041d054f7c90399e64d7
SHA512 156294cb3e3da353a5f3459d9cb1d8c7fe3948661f2202a18473f7c0447a99bc02afd5aa5ee6dc14dc07143e082288c7b89c4528a84fe88300aa46e35ea1181a