Analysis
-
max time kernel
179s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
12-06-2024 23:40
Static task
static1
Behavioral task
behavioral1
Sample
c792a529af43cad9646cf9ecfdc8d36a1ca74a1ccdd1128abbb95ff04df2775b.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
c792a529af43cad9646cf9ecfdc8d36a1ca74a1ccdd1128abbb95ff04df2775b.apk
-
Size
436KB
-
MD5
02959e285c514b37438b5dec2982b295
-
SHA1
86034cda326d1f8fca1a07beebb92617e1ce05df
-
SHA256
c792a529af43cad9646cf9ecfdc8d36a1ca74a1ccdd1128abbb95ff04df2775b
-
SHA512
b53387d60187835b220ad5b7d1e1dc63a682d704c0fa1ff3a2744927c5ff46fc73bc8f979100d1b7176684e3235e401993373e19c2b4ba931e7c9c93b6b1503e
-
SSDEEP
6144:AcIaQYiSWTql6+iK6edDusVeDaOJ3CBtKXyFju92/HAjjcJ1ttT6zziXXjhVDnDX:AeAcWyysVeDaNju9+HkAbtT4qnDZDZea
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule /data/data/fxykfla.jutmhwgzg.wrwnab/files/b family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabioc process /system/bin/su fxykfla.jutmhwgzg.wrwnab /system/xbin/su fxykfla.jutmhwgzg.wrwnab /sbin/su fxykfla.jutmhwgzg.wrwnab -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
fxykfla.jutmhwgzg.wrwnabioc pid process /data/user/0/fxykfla.jutmhwgzg.wrwnab/app_picture/1.jpg 4339 fxykfla.jutmhwgzg.wrwnab /data/user/0/fxykfla.jutmhwgzg.wrwnab/app_picture/1.jpg 4339 fxykfla.jutmhwgzg.wrwnab /data/user/0/fxykfla.jutmhwgzg.wrwnab/files/b 4339 fxykfla.jutmhwgzg.wrwnab /data/user/0/fxykfla.jutmhwgzg.wrwnab/files/b 4339 fxykfla.jutmhwgzg.wrwnab -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Framework service call android.accounts.IAccountManager.getAccounts fxykfla.jutmhwgzg.wrwnab -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process URI accessed for read content://mms/ fxykfla.jutmhwgzg.wrwnab -
Acquires the wake lock 1 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock fxykfla.jutmhwgzg.wrwnab -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground fxykfla.jutmhwgzg.wrwnab -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fxykfla.jutmhwgzg.wrwnab -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Framework service call android.app.IActivityManager.registerReceiver fxykfla.jutmhwgzg.wrwnab -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
fxykfla.jutmhwgzg.wrwnabdescription ioc process Framework API call javax.crypto.Cipher.doFinal fxykfla.jutmhwgzg.wrwnab -
Checks CPU information 2 TTPs 1 IoCs
Processes
-
fxykfla.jutmhwgzg.wrwnab1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/fxykfla.jutmhwgzg.wrwnab/app_picture/1.jpgFilesize
168KB
MD52d29336a9a5f81514bca3f0a057faccf
SHA15ba17309dca16cf06adad40135b5510e222091f3
SHA256783e6ca26ee182302fd40741ca7fac8d8c0bf58d9d42221ce576c2cccb3e30e6
SHA51284d6ef940400dbfed4c9b05210883e9a9bc871fbd6902d267afa89b6deb40b35e6812c8f5d2ecad69f7fd7e1d45ef47784fb4297a8145fed014060842ecf8a8a
-
/data/data/fxykfla.jutmhwgzg.wrwnab/files/bFilesize
444KB
MD55052e382193805f854a17470afdeadc8
SHA1e434b19018b8d0a14c3db4b47318a9e92e9f5148
SHA2566eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a
SHA512be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7
-
/data/user/0/fxykfla.jutmhwgzg.wrwnab/app_picture/1.jpgFilesize
168KB
MD53d21ff661d51cd28a6fe18ff94074755
SHA1fcdefdd0367eaaab26d3a7786c1c7522ea456570
SHA25692c47434f6b623a5377223c5ecb66e5e701c18960292dd3546545343ece5c062
SHA5120e64791cc5b575ba0b2671babeb3babc53eee09e79a4397bd65d3d5eaa44504bea0850b547e8cb9085a616e5c6b7d1fe9bdc35c2eca5bb4797f2854c1a4244bd
-
/storage/emulated/0/.msg_device_id.txtFilesize
36B
MD55235914abda9b9a463df3e92dd91485a
SHA139c2fd2e89e5fe1f382cd5cb6a2a4aa61f8980f7
SHA2562a26b26b78c6e24cb5f35b67471962b635ca79a370951749b0216d0f84b33321
SHA512c94d7eccce9283785d1a4a8684e416860ec4f33f41ff333e016c75b2dee775e2bae9568a3cd64c41e122098b78602ae083d1992d7d76e244c7947d0032034ff5