Analysis
-
max time kernel
2382659s -
max time network
154s -
platform
android_x64 -
resource
android-33-x64-arm64-20231215-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system -
submitted
20-12-2023 07:04
Static task
static1
Behavioral task
behavioral1
Sample
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214.apk
Resource
android-33-x64-arm64-20231215-en
General
-
Target
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214.apk
-
Size
278KB
-
MD5
551e5fa9b14d37b224a7784cbcfa3c0b
-
SHA1
b8fc6fc2cd097536d66f0167b09e8a7247ffbfcb
-
SHA256
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214
-
SHA512
f185ab1eece74cb7adc64c370d594cf0d742a569e5578d6c04a94c18a622b0fbc3bde259fb864a14a20e90e3773efb8df6890062bee1cd636861cbcbe5f23063
-
SSDEEP
6144:3NPeAmgQKM0hFZzkkjTxdA3gky3RpSfOWtzIea0:pePgQsPPdA3gky32fHtzIel
Malware Config
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/memory/4302-0.dex family_xloader_apk behavioral1/memory/4302-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fsup.xh.yfn.fdopo/files/b 4302 fsup.xh.yfn.fdopo -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fsup.xh.yfn.fdopo -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fsup.xh.yfn.fdopo
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD5a0cfd683ef1acf06879bb3b578ca2f1e
SHA133dfe4869ec0516d6cdce8e3b7a1ea57fff3eec0
SHA256896a5e048164efaa896f839e09d5eac6239fdfdf67c498dc47982417c14e43ab
SHA5121d1bb6fd9297e696264783ffda96df6eb786eda9aa953ad1abebf3732f767747ce89ff71f9f84fb77a8c5ac342439c0baa6702d3b34dcea4c4f9c95b3ad403d9