Analysis

  • max time kernel
    3771723s
  • max time network
    153s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20231215-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system
  • submitted
    06/01/2024, 22:01

General

  • Target

    a3fd79b15586ccd372a771ef6770fdec6ea9228eaacf12ebd452274da1796133.apk

  • Size

    410KB

  • MD5

    c20dce22d59436bc27ada30bcd5b9b68

  • SHA1

    335dbfa2f4bdaa4fbe8086fcd913d741f8e4b269

  • SHA256

    a3fd79b15586ccd372a771ef6770fdec6ea9228eaacf12ebd452274da1796133

  • SHA512

    7e86948a1723f54cf892066408abfb9a1dd6c7c11b49c4f5cc09fad14f6806b4b29a405b9f43235c48cb8a61ccca8b6540060e4e7ca4e1c408d02ce38b5e95e4

  • SSDEEP

    12288:IaECTArtgbbYC5F4ItIL7gdF9Iib4suJCAB5V:NECM5e0GiIt2a6k4dHBL

Malware Config

Signatures

  • XLoader payload 2 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Loads dropped Dex/Jar 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Acquires the wake lock 1 IoCs

Processes

  • h.xzm.hqno
    1⤵
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    PID:4285

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/h.xzm.hqno/files/d

    Filesize

    454KB

    MD5

    b4633b5e8078a21f10b62fe343b64a44

    SHA1

    491670985b445300a7e3a7ca9ed100e5f530d886

    SHA256

    a6c62d333537d9614acaf86ede1368c35dde013542600d14574bdd8eead9b919

    SHA512

    b4465aef72ba104388f322b22c1e36d81330ac581e2b280eb5506fb22ebbc89691fb4f4d05b3ca814582dcd55603bcbbf8376d3602b72066d4acf5bcf4c49748