Analysis
-
max time kernel
3328910s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
31-12-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
230dc1092f2db4bedf15cd5abfcfe893.apk
Resource
android-x86-arm-20231215-en
General
-
Target
230dc1092f2db4bedf15cd5abfcfe893.apk
-
Size
445KB
-
MD5
230dc1092f2db4bedf15cd5abfcfe893
-
SHA1
9052b0e2a2186c4151d85b9562a9a33e073c6092
-
SHA256
624339883e6c717c756176cba1e3b12eaa096a84bbaa93726bce0a748e428afd
-
SHA512
f24aaa57c09f59f67556dcb38a3740c47cc7abfd50b8074da8bbd5dfd38e7afe9f2af0881b46e7245b9ea8ec295eac6b2b6cad154d6da7a8d89ca7e2e954817d
-
SSDEEP
12288:YWUv8psXBnCTAte+M1SyD7DAEXqyqQnSMey7SQZyZ:YWlpsXpCTArM1SyD7Duy5g8kZ
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
pid Process 4246 a.mzjzsf.vjqicl -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/a.mzjzsf.vjqicl/files/d 4246 a.mzjzsf.vjqicl /data/user/0/a.mzjzsf.vjqicl/files/d 4246 a.mzjzsf.vjqicl -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock a.mzjzsf.vjqicl -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal a.mzjzsf.vjqicl
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5d28e6b862a1aee68793e1b022f18306a
SHA19044c8b066fc6610bb53b2fe4fec1c8b3e5ae985
SHA25605d35fa20111813c4e3063181b5b90d7f13a03856e6104f1dfc64c735055c76a
SHA51264d6105fc4a17057c184804a6214a99e4f96326af423fa11cd7cc89ea0cd1c9e67e43e91ecbaf8ccea6b3175a05dc1d2a3dd1cbd0830d921dfbfb738ec874526
-
Filesize
988B
MD5d1ba87089f11488975eee231938a6dd5
SHA131b12e6446d40ff2a7f235c3d19ee87461376b46
SHA256de772e624e0e4c110e22079d7f25c05e07f2ce88698f3b0c191fc8237d8f5391
SHA512004d995ce70805715221826abc0a4783c557456694cca6c68d6b667c84a5a75007757238108295a58d45520cbf20b0484589c9d38d0b69505bd6a62abfc41868
-
Filesize
36B
MD5ab2225d7845dbc1b5676c5f5726d4fbc
SHA141dc0358948653cf025cb73f080cf1547c9e96c1
SHA256a3b2c1c30abf0186b5e91150bcf0a98202764912fb0ac49105c596535c0dd324
SHA512493b3cc6151b1276c0df66289a955667615d67f992a67172208922f1355ca1adeb332fd0cafa13dd54f4e013655c1f4dbd61b741ec911f5762b494d6f6b2e3b8