Analysis
-
max time kernel
150s -
max time network
153s -
platform
android_x64 -
resource
android-33-x64-arm64-20240229-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240229-enlocale:en-usos:android-13-x64system -
submitted
07-04-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058.apk
Resource
android-33-x64-arm64-20240229-en
General
-
Target
4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058.apk
-
Size
283KB
-
MD5
ac23f6f70c83562c104408d9c23ce490
-
SHA1
b9e21f3cd8c52ef65c0cc5335ce2264c539b2ffa
-
SHA256
4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058
-
SHA512
5078a03f0909c2a6fa15b9c58043d8977f2f6999ddc09305df29fe60b545b64c772a3c0d777b8f6050a8d8ab5cda52c4e1bb5b9215eb869ba2b3df2483629035
-
SSDEEP
6144:yWZ6munmRZ5DRKX8yJmnTxhnYtyXSxxbZL07QavEE7BAYBxnf7Ucpzq9R+Bo8/y7:lgm5DG8tTxhnYtyiXlacEdAKRc9sC5Z
Malware Config
Signatures
-
XLoader payload 2 IoCs
Processes:
resource yara_rule /data/user/0/kxa.ip.wzrdaz.ogmx/files/b family_xloader_apk /data/user/0/kxa.ip.wzrdaz.ogmx/files/b family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
kxa.ip.wzrdaz.ogmxioc pid process /data/user/0/kxa.ip.wzrdaz.ogmx/files/b 4323 kxa.ip.wzrdaz.ogmx -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
kxa.ip.wzrdaz.ogmxdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground kxa.ip.wzrdaz.ogmx -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
kxa.ip.wzrdaz.ogmxdescription ioc process URI accessed for read content://mms/ kxa.ip.wzrdaz.ogmx -
Acquires the wake lock 1 IoCs
Processes:
kxa.ip.wzrdaz.ogmxdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock kxa.ip.wzrdaz.ogmx -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
kxa.ip.wzrdaz.ogmxdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS kxa.ip.wzrdaz.ogmx
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD5b2b23c0bd2f870df08dc4f60a1f5c64b
SHA166f8456a8f024da01e77c119bfd90cad9c1f8029
SHA256de0fcf61abbc9e7879343135ad0a42e600f39cb04136966c956b54326679e992
SHA512fb7e16e08ef0d7489ce18a79cf788d86dc8784ac3027e126ad225c6cd32b44e7c815ee86b4ff633177ff8679150b51d9d0e59f11bdc2af1c28fdaf8dc0079f4c