Analysis
-
max time kernel
2371747s -
max time network
153s -
platform
android_x64 -
resource
android-33-x64-arm64-20231215-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system -
submitted
20/12/2023, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199.apk
Resource
android-33-x64-arm64-20231215-en
General
-
Target
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199.apk
-
Size
278KB
-
MD5
1d21fa0ced2a9036abd1aba44a812c89
-
SHA1
312c7ae429d0ae92d97fd5fec39db11414b56a09
-
SHA256
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199
-
SHA512
e5aa6e738f10ba5b67ee4b7c29d8ee81db1446e25b3e5370eb395b9f37b60ce1be478ee8f205577363deed68484d9148f57f0efa883331ffbf8257940ae7f97f
-
SSDEEP
6144:9e/GCzUiyiuguhZNt6E0PxYaBxnf7Ucpzq9R+Bo8/y5N:krzKhZtEPJRc9sC5N
Malware Config
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/memory/4237-0.dex family_xloader_apk behavioral1/memory/4237-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/eq.dgjt.xtnb.cx/files/b 4237 eq.dgjt.xtnb.cx -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock eq.dgjt.xtnb.cx -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS eq.dgjt.xtnb.cx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD5a0cfd683ef1acf06879bb3b578ca2f1e
SHA133dfe4869ec0516d6cdce8e3b7a1ea57fff3eec0
SHA256896a5e048164efaa896f839e09d5eac6239fdfdf67c498dc47982417c14e43ab
SHA5121d1bb6fd9297e696264783ffda96df6eb786eda9aa953ad1abebf3732f767747ce89ff71f9f84fb77a8c5ac342439c0baa6702d3b34dcea4c4f9c95b3ad403d9