Analysis
-
max time kernel
2343084s -
max time network
151s -
platform
android_x64 -
resource
android-33-x64-arm64-20231215-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system -
submitted
20-12-2023 04:10
Static task
static1
Behavioral task
behavioral1
Sample
830964105bec0aff021aec95b5bfccb478151e2f22e86dfcefe40915ac42c741.apk
Resource
android-33-x64-arm64-20231215-en
General
-
Target
830964105bec0aff021aec95b5bfccb478151e2f22e86dfcefe40915ac42c741.apk
-
Size
278KB
-
MD5
78bdf9fbecf735118cba32a49608822d
-
SHA1
f12611acf0c501a99146df6f83ba267adff9ab6e
-
SHA256
830964105bec0aff021aec95b5bfccb478151e2f22e86dfcefe40915ac42c741
-
SHA512
50469603e061170daabf9dc8bab91c2a777af3b41e13fe27aa77384e75908f1239c4159724fc9a073603490a912ff5b6a175f37277cc8a1e36e239f31ac4a8ba
-
SSDEEP
6144:5tkER/GCzUiyiuguhZNt6E0PxYv+yqBxnf7Ucpzq9R+Bo8/y5S:5rzKhZtEPdy8Rc9sC5S
Malware Config
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/memory/4221-0.dex family_xloader_apk behavioral1/memory/4221-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/pavz.lch.lr.ans/files/b 4221 pavz.lch.lr.ans -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock pavz.lch.lr.ans -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS pavz.lch.lr.ans
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD5a0cfd683ef1acf06879bb3b578ca2f1e
SHA133dfe4869ec0516d6cdce8e3b7a1ea57fff3eec0
SHA256896a5e048164efaa896f839e09d5eac6239fdfdf67c498dc47982417c14e43ab
SHA5121d1bb6fd9297e696264783ffda96df6eb786eda9aa953ad1abebf3732f767747ce89ff71f9f84fb77a8c5ac342439c0baa6702d3b34dcea4c4f9c95b3ad403d9