Analysis
-
max time kernel
179s -
max time network
183s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
12-06-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
e7e71a3442a01e79083f2dc4e22ede27b720324d4c96afed1b161247b470987d.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
e7e71a3442a01e79083f2dc4e22ede27b720324d4c96afed1b161247b470987d.apk
-
Size
436KB
-
MD5
ad3b08adf6a55b768bd2a1d2b957f8b2
-
SHA1
41e168a4a5f0e5738b486e562d3d8c922c4ca50f
-
SHA256
e7e71a3442a01e79083f2dc4e22ede27b720324d4c96afed1b161247b470987d
-
SHA512
b111b88af0a785083579ffa46df1efbc28c0e0547043dd4469032fd54fd33e764f7dbc20aef098e5cbe75cdf6f5ea84638c7bd9a1646b8c42f9397da6d32d727
-
SSDEEP
12288:AWPkYCmdzAcWyysVeDaNju9+HkAbtT4q+:A/hgys7udAbM
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/xbin/su fgecsdz.eeilmuodo.wcvwfm /sbin/su fgecsdz.eeilmuodo.wcvwfm /system/bin/su fgecsdz.eeilmuodo.wcvwfm -
pid Process 4324 fgecsdz.eeilmuodo.wcvwfm -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fgecsdz.eeilmuodo.wcvwfm/app_picture/1.jpg 4324 fgecsdz.eeilmuodo.wcvwfm /data/user/0/fgecsdz.eeilmuodo.wcvwfm/app_picture/1.jpg 4324 fgecsdz.eeilmuodo.wcvwfm /data/user/0/fgecsdz.eeilmuodo.wcvwfm/files/b 4324 fgecsdz.eeilmuodo.wcvwfm /data/user/0/fgecsdz.eeilmuodo.wcvwfm/files/b 4324 fgecsdz.eeilmuodo.wcvwfm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts fgecsdz.eeilmuodo.wcvwfm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ fgecsdz.eeilmuodo.wcvwfm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fgecsdz.eeilmuodo.wcvwfm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground fgecsdz.eeilmuodo.wcvwfm -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fgecsdz.eeilmuodo.wcvwfm -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver fgecsdz.eeilmuodo.wcvwfm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal fgecsdz.eeilmuodo.wcvwfm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo fgecsdz.eeilmuodo.wcvwfm
Processes
-
fgecsdz.eeilmuodo.wcvwfm1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4324
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD56f5cda529d1981aa643c0e2d86106876
SHA1be6c04a791041a3da8c29b9c093c180e280d4b84
SHA25682de5e08329447134cf71beec8a131d48a0ad88ab77b3fdf1d063e3c433bee6e
SHA5126c47b0d43dfdf0f55723e8f2ff81d82c498559cf3e3ed8e3e90ad69f49a5ff2684c8e2f2aa1b4f529db967984aa8566bfe2c04300f6a4b4f13d275777d4d32a8
-
Filesize
444KB
MD55052e382193805f854a17470afdeadc8
SHA1e434b19018b8d0a14c3db4b47318a9e92e9f5148
SHA2566eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a
SHA512be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7
-
Filesize
166KB
MD5b264f1799c4ffde7af01b762525a1a4f
SHA1e5065b5629a17455582b80e5c1e0149d1f649e3e
SHA2564d1fdfaf4d2eebe2954ca36938433417c613c53b3601606f78b824571cb3cc66
SHA512c010a91729db5b051ebcdea156167ae032e735ddc46db0e3e7516f00e9c545a27efe2f641307381ff3e1ef50398bdb3c1660a19b158bd5c850527f878f30d24e
-
Filesize
36B
MD5cb919b1b917dc3bba148ee3856c163af
SHA1116fdd8870b71ac2bce188a59f9de35ada8142ea
SHA2564b9d587994d95676d5105d2c455fb8a7b960bbe4612d81cea5f1061fe1b13110
SHA512d3007c89f903208f2bddb71ccb0640ef4458e9badd21159bc620f4fb5d6f1609377bfbffa2613c6c5416e898bd78d895911d43a4ccbd30d9f1ab1ba350e56cde