Resubmissions
21-09-2023 18:52
230921-xjktpshh7x 721-09-2023 18:48
230921-xf1qraca38 720-09-2023 22:01
230920-1xj14sch82 10Analysis
-
max time kernel
3030436s -
max time network
161s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20230831-enlocale:en-usos:android-11-x64system -
submitted
20-09-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
861d1372c10d2696d07c13b796fa89ac7a4251d3e0e3071a7bb8e1ea4652f746.apk
Resource
android-x64-arm64-20230831-en
General
-
Target
861d1372c10d2696d07c13b796fa89ac7a4251d3e0e3071a7bb8e1ea4652f746.apk
-
Size
283KB
-
MD5
0fd002c57b06fda45e9a008b47385da8
-
SHA1
d2e225e0d4b74611039c58aa6efe79e4b457d6dc
-
SHA256
861d1372c10d2696d07c13b796fa89ac7a4251d3e0e3071a7bb8e1ea4652f746
-
SHA512
b62b01f9f55287883519999036e3600e6318fc8f73ee88285e0d4ea03c7e82b8506c263d5995ce791e0302e99a8c9ab1b31b6f5f6de62e8ed3a981c457e5a704
-
SSDEEP
6144:xaDTvL4dJdZ9xnSi7xvGCtpAg08Pp/wh7B3U0ZxXME8btHbX+sSrt:OQJ7KUoIpABGp4JBEEBM3bF6Z
Malware Config
Extracted
xloader_apk
http://91.204.227.33:28899
Signatures
-
XLoader payload 2 IoCs
Processes:
resource yara_rule /data/user/0/xmzyo.wkls.zcav.drmqdz/files/b family_xloader_apk2 /data/user/0/xmzyo.wkls.zcav.drmqdz/files/b family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Processes:
xmzyo.wkls.zcav.drmqdzpid process 4512 xmzyo.wkls.zcav.drmqdz -
Acquires the wake lock. 1 IoCs
Processes:
xmzyo.wkls.zcav.drmqdzdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock xmzyo.wkls.zcav.drmqdz -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
xmzyo.wkls.zcav.drmqdzioc pid process /data/user/0/xmzyo.wkls.zcav.drmqdz/files/b 4512 xmzyo.wkls.zcav.drmqdz /data/user/0/xmzyo.wkls.zcav.drmqdz/files/b 4512 xmzyo.wkls.zcav.drmqdz -
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
xmzyo.wkls.zcav.drmqdzdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS xmzyo.wkls.zcav.drmqdz -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
xmzyo.wkls.zcav.drmqdzdescription ioc process Framework API call javax.crypto.Cipher.doFinal xmzyo.wkls.zcav.drmqdz
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD537084c92cb78f08298b4ff2d5f7a78c6
SHA13b59865fc0d10f16b7705bc51af7ca1cf948441a
SHA2568ee144a6930c4e868acd384c31785ba5dd3b45e5dda85acf99179732ca56c4de
SHA5125f0007e0821ce1c9156733cc74b92eaa0f9fc3e853362986bb93d04c83a829625d21a09db225d26a4d6ff0bd0b75aad220b172b50ff0b8aa750c50642dee83d6
-
Filesize
505KB
MD537084c92cb78f08298b4ff2d5f7a78c6
SHA13b59865fc0d10f16b7705bc51af7ca1cf948441a
SHA2568ee144a6930c4e868acd384c31785ba5dd3b45e5dda85acf99179732ca56c4de
SHA5125f0007e0821ce1c9156733cc74b92eaa0f9fc3e853362986bb93d04c83a829625d21a09db225d26a4d6ff0bd0b75aad220b172b50ff0b8aa750c50642dee83d6
-
Filesize
907B
MD5987b2a3febe09683831ac8f5f02ac17d
SHA160df5539a1f9367a23750122fcd4ad02d12ab227
SHA256f307170af0f76a7ae8b89e64d0b6d0a0549e8780358f8e1d28591a2d1c3fd1f6
SHA512d474d070ad2aeb5dbf9621b7f923e0b7ae37c06bc8144a5697e9760747a963b3bfa11ff54faa32bb9900e6fe180b568bb663926b49f8736648523404bc54fa00
-
Filesize
36B
MD5507ef8be6d7ede7272621f59285ef099
SHA143a66013b186a3fc50f3d9bfcb8ae6994d588774
SHA2563292dbfd822da268c996f9bd4d92c7901f5754813c824be7b5849a70966e82c7
SHA512fdf0ef0f3f864ced51ee30f1fb5b87d4769a27c0f46a5917029b1d1ef477d41c34f596899bfb5de8f35b04a565d004721bae7c0c3daba5389230343b989124a4