Analysis
-
max time kernel
179s -
max time network
185s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
12-06-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
9e4deaa39080139c3663f125bee1d66e6f5611353cf49340f6c83625b4147e4a.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
9e4deaa39080139c3663f125bee1d66e6f5611353cf49340f6c83625b4147e4a.apk
-
Size
436KB
-
MD5
7d9696fd19994a5493b1533090493c75
-
SHA1
096ac6d50270fec061c072030829908a9157cf3b
-
SHA256
9e4deaa39080139c3663f125bee1d66e6f5611353cf49340f6c83625b4147e4a
-
SHA512
e624d4370676ce68da112149c06f6d4620a35f07fad64b8bf9135d35b39a627f2f4a127564af9072232e1457adb23002780daadc660a516b3b80c7f191757b7f
-
SSDEEP
6144:XpacvavXEiqlutIHbIaQYiSWTql6+iK6edDusVeDaOJ3CBtKXyFju92/HAjjcJ1V:ZvWDZIHLAcWyysVeDaNju9+HkAbtT4qN
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule /data/data/bxolndb.gzwsvxktw.dhghuk/files/b family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukioc process /system/bin/su bxolndb.gzwsvxktw.dhghuk /system/xbin/su bxolndb.gzwsvxktw.dhghuk /sbin/su bxolndb.gzwsvxktw.dhghuk -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
bxolndb.gzwsvxktw.dhghukioc pid process /data/user/0/bxolndb.gzwsvxktw.dhghuk/app_picture/1.jpg 4323 bxolndb.gzwsvxktw.dhghuk /data/user/0/bxolndb.gzwsvxktw.dhghuk/app_picture/1.jpg 4323 bxolndb.gzwsvxktw.dhghuk /data/user/0/bxolndb.gzwsvxktw.dhghuk/files/b 4323 bxolndb.gzwsvxktw.dhghuk /data/user/0/bxolndb.gzwsvxktw.dhghuk/files/b 4323 bxolndb.gzwsvxktw.dhghuk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Framework service call android.accounts.IAccountManager.getAccounts bxolndb.gzwsvxktw.dhghuk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process URI accessed for read content://mms/ bxolndb.gzwsvxktw.dhghuk -
Acquires the wake lock 1 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock bxolndb.gzwsvxktw.dhghuk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground bxolndb.gzwsvxktw.dhghuk -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS bxolndb.gzwsvxktw.dhghuk -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Framework service call android.app.IActivityManager.registerReceiver bxolndb.gzwsvxktw.dhghuk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
bxolndb.gzwsvxktw.dhghukdescription ioc process Framework API call javax.crypto.Cipher.doFinal bxolndb.gzwsvxktw.dhghuk -
Checks CPU information 2 TTPs 1 IoCs
Processes
-
bxolndb.gzwsvxktw.dhghuk1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/bxolndb.gzwsvxktw.dhghuk/app_picture/1.jpgFilesize
164KB
MD53fe44f0ebdd108669198f01b6df3cc3b
SHA13b1cb887021810b89a21854c1a2906241ab5c855
SHA2562e9edb69fc990d8e237e3fbbbbb2e5a56717d63e99ac6c99e995ba3fb1faabf0
SHA512254355d6dc0ba9d33253bd29efbf13c668a7194659813eb6a0e73069665064328c8ec6b4e4c731bc8353c0c969f5e9c7106d52e1ffceaf3a78a9eaf64bc37fdc
-
/data/data/bxolndb.gzwsvxktw.dhghuk/files/bFilesize
444KB
MD55052e382193805f854a17470afdeadc8
SHA1e434b19018b8d0a14c3db4b47318a9e92e9f5148
SHA2566eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a
SHA512be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7
-
/data/user/0/bxolndb.gzwsvxktw.dhghuk/app_picture/1.jpgFilesize
164KB
MD584b3f922eb597fbde0b979d816530d9e
SHA1be2467e30e2512c025c6f0bd3a256c8d423ebd0c
SHA2568806ab59adfe73f2ea3baf6b0cfd8f41bf1162e25d56731d2b856733bc7f6381
SHA51264d781980dcd13e5fea32a8fcdcf51ec25a314b3b671a252a2e43d1bfe78446be0b117ecf3479064760ed7a526108fbfa6d7d8a9897823056a13b30e0a103227
-
/storage/emulated/0/.msg_device_id.txtFilesize
36B
MD5720377b183e9ce3065db806818193bea
SHA1a546d64bf4e34776ebe694fbc4cc962146908a8d
SHA25682f27a5837945dc25d778e04a9ad91e60fa61d1d8274d869920c11f85a251962
SHA51221cc083ba2d1ad9922cdf85b796af03342a18b3881bce624c30af3c028b50f775d299effb03ce4d483d726a0a8e8d96e9caef0fa5aa1851ff6ee5a45eac18adb