Analysis
-
max time kernel
150s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
26/03/2024, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
df3538de6a20c43301a4e1f44429747a.apk
Resource
android-x86-arm-20240221-en
General
-
Target
df3538de6a20c43301a4e1f44429747a.apk
-
Size
445KB
-
MD5
df3538de6a20c43301a4e1f44429747a
-
SHA1
3a3d0803f9f6999a1402ff469b1aa73c1ba066ea
-
SHA256
e20059f5685a7cfe981447f4dad6f42a35d5b545622b0949a060af7742efe0d9
-
SHA512
53d7737ab2d6c9fe06a754b061334526f8a1028ab06807afeb1e1652fe7b9ada8dd9cba34b3709e7dacfc0fb81f8ecb0fd5a64d659672d7d82a78af312239d8f
-
SSDEEP
12288:gZu/w81UwnZDbu/D7DAEXqyqQnSMey7SQZyB:3/w81LZDK/D7Duy5g8kB
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
pid Process 4243 h.wi.cljs -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/h.wi.cljs/files/d 4243 h.wi.cljs /data/user/0/h.wi.cljs/files/d 4243 h.wi.cljs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground h.wi.cljs -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/raw_contacts h.wi.cljs -
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ h.wi.cljs -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock h.wi.cljs -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal h.wi.cljs
Processes
-
h.wi.cljs1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Reads the contacts stored on the device.
- Reads the content of the MMS message.
- Acquires the wake lock
- Uses Crypto APIs (Might try to encrypt user data)
PID:4243
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5d28e6b862a1aee68793e1b022f18306a
SHA19044c8b066fc6610bb53b2fe4fec1c8b3e5ae985
SHA25605d35fa20111813c4e3063181b5b90d7f13a03856e6104f1dfc64c735055c76a
SHA51264d6105fc4a17057c184804a6214a99e4f96326af423fa11cd7cc89ea0cd1c9e67e43e91ecbaf8ccea6b3175a05dc1d2a3dd1cbd0830d921dfbfb738ec874526
-
Filesize
1KB
MD594f3c4eebee4e91a8d1deb11d09d6c36
SHA101ebc988270b4c7bca265d775f3405526e294de5
SHA2561728653df6a55b128d5b8d307c7a7c13ef5e16c435ad10bb585b7592f93872d9
SHA5128f98fa0cdd3b67aa0b5f72dd2bbdf53c11d0a082c3c7e395ae5dc9fd636f24323e0fb38360f138b23fc8555042e6b5cc1293ebef97ed066558784b1404c50042
-
Filesize
36B
MD5432a86cb6e4e66219c13142bcf3192fb
SHA1ac7bdbddf19b8df6b908a174a9e9f4008e6a3185
SHA256f05c48a653b461cbd2676e53ced111eb811e7b3386492e0ecc44cc461f546b4b
SHA512178be8119db32043987dd01ed93342015e9d2d990b0ff9810ebe93619c82dee4741e5e06a13b48f5a6b0cd0f9e0f6827535e92f1a8c69f8b01b6559d85dfb83d