Analysis

  • max time kernel
    179s
  • max time network
    183s
  • platform
    android_x86
  • resource
    android-x86-arm-20240611.1-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system
  • submitted
    12-06-2024 23:36

General

  • Target

    c00c91cb21957cbdfab43bf1364f1f4cac626d8b08f2a14e3f284047ccb7a5d5.apk

  • Size

    440KB

  • MD5

    51b99c4c9a0f2c69d436677d40a740c5

  • SHA1

    e3da000d25399191ebfc30d3830645ce94a3eaa2

  • SHA256

    c00c91cb21957cbdfab43bf1364f1f4cac626d8b08f2a14e3f284047ccb7a5d5

  • SHA512

    d15228921644bf3f257bd165a6da3587dc0a2e055d06af2c3456c25e72a3290c6bf33561e0df15dff5b53a4aa58b2070c34a0f9de5f883358614114191cfb888

  • SSDEEP

    12288:Pt0MsK/mZSlMGAcWyysVeDaNju9+HkAbtT4qj:Pt0Ms6rys7udAbV

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Checks the presence of a debugger
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • elcsqac.ewqaqopjw.maeios
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4318

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/elcsqac.ewqaqopjw.maeios/app_picture/1.jpg
    Filesize

    172KB

    MD5

    af821cd2ada38efe41da19ab97313419

    SHA1

    d91b6d9e4d88704ed912fdb10dee7aa6532d751b

    SHA256

    417b6b2432109ba9ea47a8244071c14e94765cc7ddb992d299d46b373e336af9

    SHA512

    507ab92842fda3a694cd17dedbc1db5d50da8a903123cb109408a164b2edcb172f1c375b3bd08b8f67891186ddaf9be1e7709296b5ca6a5962ff1f5e8d8c6a38

  • /data/data/elcsqac.ewqaqopjw.maeios/files/b
    Filesize

    444KB

    MD5

    5052e382193805f854a17470afdeadc8

    SHA1

    e434b19018b8d0a14c3db4b47318a9e92e9f5148

    SHA256

    6eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a

    SHA512

    be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7

  • /data/user/0/elcsqac.ewqaqopjw.maeios/app_picture/1.jpg
    Filesize

    172KB

    MD5

    f2f3a97a56ec9a2c4c8a423e433d050b

    SHA1

    c3cee7f06ca9445c838e164a5ad539a0abe55306

    SHA256

    9f9bb4e47693391f3649f4f4a32ae77d86a29d7071d402fc726871b2739326e4

    SHA512

    c2989a0f0cc3fd56d82e400343de26cb8e69170a76017a23f987d6ffde1395059ebf88e7838513c46cfcb046c4cf0a6fa4676adc510794f1cde19130c9235e2b

  • /storage/emulated/0/.msg_device_id.txt
    Filesize

    36B

    MD5

    71bdef1133b32ec82cbf43821cf8faba

    SHA1

    d1e0b10ef6306efe7ee99650f86a499b3162b484

    SHA256

    37cb3e5d7aee4811245d5c7e9b280427eff62af03bb80fb6c772de0ea5e2200a

    SHA512

    b00ca17a0998ce76a5024b1e47dade46055b4dd286c1bb4ac65613421c3d00dde27479bf38586d67e5cf24111af3a7ed89fa311bff27ae4e4d6b367b257227fe