Analysis
-
max time kernel
150s -
max time network
135s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
18-03-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
d2110db05a98311069c20b3ecc2814b7.apk
Resource
android-x86-arm-20240221-en
General
-
Target
d2110db05a98311069c20b3ecc2814b7.apk
-
Size
445KB
-
MD5
d2110db05a98311069c20b3ecc2814b7
-
SHA1
60441e5b7881d063e849452cbe4af37669f10e0e
-
SHA256
305122d541f3736ce622ad4086235f86017bc56b0821ab409f8687b9b1bace5a
-
SHA512
4b2910eaabc3618e34f98468413a9497e2d8880db804db1e2344ba3c958417603b5082a46c90d6ddb66fa146c8bb65299969ec0431733b20a358993189c22a5b
-
SSDEEP
6144:vUSv4krzSXaIg1iJu10m5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Ax:vf1rOnqiJZD7DAEXqyqQnSMey7SQZyP0
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
Processes:
resource yara_rule /data/data/a.vwoj.ssd/files/d family_xloader_apk /data/data/a.vwoj.ssd/files/d family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
a.vwoj.ssdioc pid process /data/user/0/a.vwoj.ssd/files/d 4292 a.vwoj.ssd /data/user/0/a.vwoj.ssd/files/d 4292 a.vwoj.ssd -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
a.vwoj.ssddescription ioc process URI accessed for read content://com.android.contacts/raw_contacts a.vwoj.ssd -
Reads the content of the MMS message. 1 TTPs 1 IoCs
-
Acquires the wake lock 1 IoCs
Processes:
a.vwoj.ssddescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock a.vwoj.ssd -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
Processes:
a.vwoj.ssddescription ioc process Framework API call javax.crypto.Cipher.doFinal a.vwoj.ssd
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/a.vwoj.ssd/files/dFilesize
454KB
MD5d28e6b862a1aee68793e1b022f18306a
SHA19044c8b066fc6610bb53b2fe4fec1c8b3e5ae985
SHA25605d35fa20111813c4e3063181b5b90d7f13a03856e6104f1dfc64c735055c76a
SHA51264d6105fc4a17057c184804a6214a99e4f96326af423fa11cd7cc89ea0cd1c9e67e43e91ecbaf8ccea6b3175a05dc1d2a3dd1cbd0830d921dfbfb738ec874526
-
/data/data/a.vwoj.ssd/files/oat/d.cur.profFilesize
995B
MD5de939ee83e8cc9b4d8c2fc2f5a422f46
SHA135006e75c7e82386b49b14def0cd6d90da34ae20
SHA2562dc0d437cfb668bb3af67920a28a4484bcc3de56005e4e77f6158fc8a0902e44
SHA512ee05a7e2584158a0419244c99f11d7a8de1604b58324e7e66074944139f35c0b0ae6c47a87a60cefa1110c10edf914307124b60a190da5f0468b7e21444d9637
-
/storage/emulated/0/.msg_device_id.txtFilesize
36B
MD510ef2cc86d9478a51b6573826f9f74f9
SHA13c853dde2d3f423c151d13b780cdbd24c57ea524
SHA25621d58580d70a671d1dff028b1c5547eb786aea925c0ca4edc0bfd2faf2e1310b
SHA512dd82a58a3762e88ab74106fa77dbf3305c1772ea743bf8a7f6c71443aa3119693bf114f5c22fd333140fac3b8d5811f7cb975d8472a21e9d383652f9aaa299d7