Analysis

  • max time kernel
    2482607s
  • max time network
    153s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    20/12/2023, 10:37

General

  • Target

    a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6.apk

  • Size

    390KB

  • MD5

    b88c022119aefff00679f6ee55a51f8e

  • SHA1

    51eba7e3d0273a3585b67653ce365a00e7dba325

  • SHA256

    a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6

  • SHA512

    61ee92f81069c0be0144e591008abb5568dfbca66d64fdb52c34e74b3951b01a81bb3ece533364577bd6ec6027f5f868f91e44c8b2d58b89230251b3a9e89623

  • SSDEEP

    12288:tjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4SgoO:tjnb8aXzG38wP5x43oO

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Removes its main activity from the application launcher 1 IoCs
  • Loads dropped Dex/Jar 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs

Processes

  • ufD.wyjyx.vahvh
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    PID:4973

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /data/data/ufD.wyjyx.vahvh/files/dex

          Filesize

          682KB

          MD5

          e2b557721902bc97382d268f1785e085

          SHA1

          fd5d2a66cb25e46aeafa4f922c104847c75c82db

          SHA256

          231931c424611b6d93ba9548a8f0ce137ccab6f6ea6a548f33a1ad6ed75a9638

          SHA512

          0d7932d022013acd8077cc15319ea87fea30b972945734cd564e70469b1ccca0bf8196ba8192a35b1ceb6f5d676e84c250e6cb2cf465bd7701b05b8ecdf90a6d