Analysis

  • max time kernel
    2323802s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20231215-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system
  • submitted
    20/12/2023, 01:07

General

  • Target

    7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d.apk

  • Size

    278KB

  • MD5

    c04f0c527baa1aaf8d862af14f297430

  • SHA1

    e8a39a26bc7530db2a01a8c93937105a526828b9

  • SHA256

    7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d

  • SHA512

    4af8c4b6e63a2d2e7e1b2494d6893c558fab5bfa0e2de8f44dfcf1d050fd2d77e7828dd6f3044cdc5366146e6b509d2b5a98efd14b2247f372f5c4dc4710d649

  • SSDEEP

    6144:6tkER/GCzUiyiuguhZNt6E0PxYhBxnf7Ucpzq9R+Bo8/y5x:ErzKhZtEP8Rc9sC5x

Malware Config

Signatures

  • XLoader payload 2 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs

Processes

  • lxlatt.yujmok.tqd.mvxzp
    1⤵
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/user/0/lxlatt.yujmok.tqd.mvxzp/files/b

          Filesize

          509KB

          MD5

          a0cfd683ef1acf06879bb3b578ca2f1e

          SHA1

          33dfe4869ec0516d6cdce8e3b7a1ea57fff3eec0

          SHA256

          896a5e048164efaa896f839e09d5eac6239fdfdf67c498dc47982417c14e43ab

          SHA512

          1d1bb6fd9297e696264783ffda96df6eb786eda9aa953ad1abebf3732f767747ce89ff71f9f84fb77a8c5ac342439c0baa6702d3b34dcea4c4f9c95b3ad403d9