Analysis

  • max time kernel
    3891541s
  • max time network
    164s
  • platform
    android_x86
  • resource
    android-x86-arm-20220310-en
  • submitted
    21-05-2022 18:44

General

  • Target

    fd23105085a3b1c1445fafd86a08972eb8d4c7a509ead72d5b9d73c074d4d40e.apk

  • Size

    306KB

  • MD5

    2cf535a1d8d5345104e4584840836c86

  • SHA1

    5f252095223ad9f75b1407b4d124738920c006df

  • SHA256

    fd23105085a3b1c1445fafd86a08972eb8d4c7a509ead72d5b9d73c074d4d40e

  • SHA512

    e21ebd646059464cf051a7dd9140a75243751f8d925724aa0d3fc4cb66828cdc7a04c82d9d883d40ca32132e2b868aeafe388c66db38056f6e50cf08aa0bfb3a

Malware Config

Signatures

  • XLoader Payload 3 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Acquires the wake lock. 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Reads information about phone network operator.
  • Uses Crypto APIs (Might try to encrypt user data). 1 IoCs

Processes

  • fnca.dk.bj
    1⤵
    • Acquires the wake lock.
    • Loads dropped Dex/Jar
    • Uses Crypto APIs (Might try to encrypt user data).
    PID:5222

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/fnca.dk.bj/files/dex
    Filesize

    580KB

    MD5

    ed9219be2761d62f01f05dee71f02df3

    SHA1

    c2b904961f519a66052c04d444b34ef4c3f00e67

    SHA256

    b8f6a3769331039a5f2dc29eba3adc431a7b086d47ec579cd143da11f137f13d

    SHA512

    420dc0fa4e231a66fa5c26fbd7952f574aa24aec62ecdf387dd376e98dac93cbea493785d67a030bd6d6745b00c7f3b14b693f906124ee6438b6a227d682f8bd

  • /data/user/0/fnca.dk.bj/files/dex
    Filesize

    580KB

    MD5

    ed9219be2761d62f01f05dee71f02df3

    SHA1

    c2b904961f519a66052c04d444b34ef4c3f00e67

    SHA256

    b8f6a3769331039a5f2dc29eba3adc431a7b086d47ec579cd143da11f137f13d

    SHA512

    420dc0fa4e231a66fa5c26fbd7952f574aa24aec62ecdf387dd376e98dac93cbea493785d67a030bd6d6745b00c7f3b14b693f906124ee6438b6a227d682f8bd

  • /data/user/0/fnca.dk.bj/files/dex
    Filesize

    580KB

    MD5

    ed9219be2761d62f01f05dee71f02df3

    SHA1

    c2b904961f519a66052c04d444b34ef4c3f00e67

    SHA256

    b8f6a3769331039a5f2dc29eba3adc431a7b086d47ec579cd143da11f137f13d

    SHA512

    420dc0fa4e231a66fa5c26fbd7952f574aa24aec62ecdf387dd376e98dac93cbea493785d67a030bd6d6745b00c7f3b14b693f906124ee6438b6a227d682f8bd

  • /data/user/0/fnca.dk.bj/files/dex.x86.flock
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /data/user/0/fnca.dk.bj/files/oat/dex.cur.prof
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • /storage/emulated/0/.msg_device_id.txt
    Filesize

    36B

    MD5

    7f1494556269ca10ea807efb2a51d27c

    SHA1

    cef966c2f0e102f1ef49a0b0a27884f727503916

    SHA256

    6d9331e73fde25df61932805df50dc5e1efcba6842c2cd786470703d610f865f

    SHA512

    74c952ff9ea3e1b7b4d542e29f1e6196feb0564d6a8b19fcd42116f7079eef23940a702cbcbed9040f3a92f682e176ff9004a88b9839185676d44794a98c6eba