Analysis

  • max time kernel
    2290034s
  • max time network
    149s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20231215-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system
  • submitted
    20-12-2023 01:37

General

  • Target

    796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead.apk

  • Size

    278KB

  • MD5

    ca75256d56688522111ff67122e47944

  • SHA1

    f99722c9068dabba3da8929adf911e4d7193a275

  • SHA256

    796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead

  • SHA512

    150d5d7d6cd4ccdb1ac5c00c1ced42b810d69090f527df0c432eb2f9c340845cda8db1a566ec6cc6ca6833bacde0300586a8baaec2f8e663b52f0d2070d469e0

  • SSDEEP

    6144:EV86ZexSNP+WrqKlRyieeJyUgVqZ83BG5PyKbaGyJTzvLAox3:r6ZfNP+Wrq6yfFUgf4PyKbaVVXAoF

Malware Config

Signatures

  • XLoader payload 2 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs

Processes

  • kkrlcb.ggluoo.jdmmqi.yayj
    1⤵
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/kkrlcb.ggluoo.jdmmqi.yayj/files/b

    Filesize

    509KB

    MD5

    a0cfd683ef1acf06879bb3b578ca2f1e

    SHA1

    33dfe4869ec0516d6cdce8e3b7a1ea57fff3eec0

    SHA256

    896a5e048164efaa896f839e09d5eac6239fdfdf67c498dc47982417c14e43ab

    SHA512

    1d1bb6fd9297e696264783ffda96df6eb786eda9aa953ad1abebf3732f767747ce89ff71f9f84fb77a8c5ac342439c0baa6702d3b34dcea4c4f9c95b3ad403d9