Analysis
-
max time kernel
3669780s -
max time network
132s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
31/12/2023, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2ad7d7b0c1022141e9c3c789c8c5f089.apk
Resource
android-x86-arm-20231215-en
General
-
Target
2ad7d7b0c1022141e9c3c789c8c5f089.apk
-
Size
445KB
-
MD5
2ad7d7b0c1022141e9c3c789c8c5f089
-
SHA1
c8dfaa89d7186415fc1e00ab152e22326430446e
-
SHA256
15654b31de9af6e3c344618a08bf597555c2927519557702112d313dba61734f
-
SHA512
691b0a0c2f9c7e604840213c7b8148110e929bba315b8cc47474019ca0dbec00e0a49412ac602b9cde30bde66d7a0e0a14df9ace333bf056ef60a205c1ad744c
-
SSDEEP
12288:tKqm0TeWHKn6D7DAEXqyqQnSMey7SQZyn:tKx0TeWqn6D7Duy5g8kn
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
pid Process 4253 h.yoft.clm -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/h.yoft.clm/files/d 4253 h.yoft.clm /data/user/0/h.yoft.clm/files/d 4253 h.yoft.clm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock h.yoft.clm -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal h.yoft.clm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5d28e6b862a1aee68793e1b022f18306a
SHA19044c8b066fc6610bb53b2fe4fec1c8b3e5ae985
SHA25605d35fa20111813c4e3063181b5b90d7f13a03856e6104f1dfc64c735055c76a
SHA51264d6105fc4a17057c184804a6214a99e4f96326af423fa11cd7cc89ea0cd1c9e67e43e91ecbaf8ccea6b3175a05dc1d2a3dd1cbd0830d921dfbfb738ec874526
-
Filesize
1KB
MD5b18bcb16edbc62a52c520c06e20ee7cb
SHA1c9d0fe492b208b84a30afcb9ccf9d6b06ea08367
SHA2564ef83587a465eb285b1d58b0f93c9e7ee02522621ac719b07f1c7b32866a2639
SHA5123370b91fc4ab82b51a5b41840665a51aeda6d21085d1e0dfe258935f17f0b557ddfb5a2a90d8bd4ef56b0f16be3b80321d3f74021778b2cf855235436cb514b6
-
Filesize
36B
MD5d2936811b4733aa5819b04e59cae27ba
SHA12923007c2a2121aead2376c8a76754749a90405a
SHA25680ee96b7e49c4464769e383042655537c65b3f8a4ef828412efa130d14991e4e
SHA512b6d053e6f3b31cc8689f70c83f45eb85522ca55422cbe938b134f23731c46b15c59fd3c3d9a63dbecbafffb5c331259dc3a2e75fa5f3d34f02f3a08230473b1c