Analysis
-
max time kernel
3771723s -
max time network
153s -
platform
android_x64 -
resource
android-33-x64-arm64-20231215-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20231215-enlocale:en-usos:android-13-x64system -
submitted
06/01/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
a3fd79b15586ccd372a771ef6770fdec6ea9228eaacf12ebd452274da1796133.apk
Resource
android-33-x64-arm64-20231215-en
General
-
Target
a3fd79b15586ccd372a771ef6770fdec6ea9228eaacf12ebd452274da1796133.apk
-
Size
410KB
-
MD5
c20dce22d59436bc27ada30bcd5b9b68
-
SHA1
335dbfa2f4bdaa4fbe8086fcd913d741f8e4b269
-
SHA256
a3fd79b15586ccd372a771ef6770fdec6ea9228eaacf12ebd452274da1796133
-
SHA512
7e86948a1723f54cf892066408abfb9a1dd6c7c11b49c4f5cc09fad14f6806b4b29a405b9f43235c48cb8a61ccca8b6540060e4e7ca4e1c408d02ce38b5e95e4
-
SSDEEP
12288:IaECTArtgbbYC5F4ItIL7gdF9Iib4suJCAB5V:NECM5e0GiIt2a6k4dHBL
Malware Config
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/h.xzm.hqno/files/d 4285 h.xzm.hqno -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock h.xzm.hqno
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5b4633b5e8078a21f10b62fe343b64a44
SHA1491670985b445300a7e3a7ca9ed100e5f530d886
SHA256a6c62d333537d9614acaf86ede1368c35dde013542600d14574bdd8eead9b919
SHA512b4465aef72ba104388f322b22c1e36d81330ac581e2b280eb5506fb22ebbc89691fb4f4d05b3ca814582dcd55603bcbbf8376d3602b72066d4acf5bcf4c49748