Analysis
-
max time kernel
3523567s -
max time network
162s -
platform
android_x64 -
resource
android-x64-arm64-20230621-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230621-enlocale:en-usos:android-11-x64system -
submitted
07/08/2023, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
3f66c4095e1943b41aa881e1be34db4f3f338eacfd3cc25794e06bc6d83088d3.apk
Resource
android-x64-arm64-20230621-en
General
-
Target
3f66c4095e1943b41aa881e1be34db4f3f338eacfd3cc25794e06bc6d83088d3.apk
-
Size
283KB
-
MD5
68a65c7b70c6bc96970a973ee5450415
-
SHA1
166d6d5cef5a067aa2e96671af5026a42c77b708
-
SHA256
3f66c4095e1943b41aa881e1be34db4f3f338eacfd3cc25794e06bc6d83088d3
-
SHA512
950f529165a296475f8c230f0649a5e241503d6b4120b34879444a88c194a3b91905f8c7ac2b6322be9613882b58b0dbf39ffd53b8870f908f906c15e12c5eaf
-
SSDEEP
6144:Rt4r6F9RtNAOXZ3UAmH9CjNqvbIRh9FCxMcuJz5yu+SiT:RtJjYOdNe9CAOh9FCx3cyuiT
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/memory/4270-0.dex family_xloader_apk2 behavioral1/memory/4270-1.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock txu.udmaz.mlu.ulrml -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/txu.udmaz.mlu.ulrml/files/b 4270 txu.udmaz.mlu.ulrml /data/user/0/txu.udmaz.mlu.ulrml/files/b 4270 txu.udmaz.mlu.ulrml -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS txu.udmaz.mlu.ulrml -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal txu.udmaz.mlu.ulrml
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD51948f47b3ea40b56b95c2afea1715414
SHA15c690f45283971be674c6d8a2e54175b0ecf55eb
SHA25655e4054d9045b3a34d808883c387d64cbae6a402ba7551f1c7a19d6b2bcc5ae7
SHA5128f3e40ff08f864901147cd60dd88191b9f792a746f0d923e3fea3a30f1ce951ec984013641b32ce1130b764f3d27974ac1a4a9d281090c8bbbff02808ffeb436
-
Filesize
505KB
MD51948f47b3ea40b56b95c2afea1715414
SHA15c690f45283971be674c6d8a2e54175b0ecf55eb
SHA25655e4054d9045b3a34d808883c387d64cbae6a402ba7551f1c7a19d6b2bcc5ae7
SHA5128f3e40ff08f864901147cd60dd88191b9f792a746f0d923e3fea3a30f1ce951ec984013641b32ce1130b764f3d27974ac1a4a9d281090c8bbbff02808ffeb436
-
Filesize
36B
MD540f0ef0b6ed28906631dc151d994b61a
SHA11a68566acfd03c0fc006a9150f196f4a325e8478
SHA256379ae13d7a88450b1fbe55ed4af7b253a5dfe11ac9e43884c12298a4da05b842
SHA512c73e9bbccb73fe6b3103b624d9e9e8f8ae7d37cbbb01f5b9957962a378786839815343d6ab523271dc35c804b4f2d168d8ee589a259e3fcc5bb890a453dfb13f