Analysis
-
max time kernel
179s -
max time network
183s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 23:41
Static task
static1
Behavioral task
behavioral1
Sample
6b64c0133d1eb9150a76fbb499e29ee08a83dc2923fcf90e2bad32a872bed4d1.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
6b64c0133d1eb9150a76fbb499e29ee08a83dc2923fcf90e2bad32a872bed4d1.apk
-
Size
416KB
-
MD5
22eebb8cd6502c33aec894b1c8b4bee4
-
SHA1
15f1bef4afec68d609f9d14a3775434093ed2590
-
SHA256
6b64c0133d1eb9150a76fbb499e29ee08a83dc2923fcf90e2bad32a872bed4d1
-
SHA512
2baba830e45b6d7eb49f03d547dd9b55fdcf33974371c59d406bd55d515a83f155a8ce968be028a990394888242c5878f07c8f0f1b0c01c775d6207248a30101
-
SSDEEP
6144:iVUPLM2JdZjUh9v/4r93MVB2+6rhx+YZD6wiiMD7K4L75SPEcNOh7Eqy:iOI2ng4ZGB2xRQwQ+4L70PPNOh7O
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su fvzglhe.bayiwkvne.jtgfup /system/xbin/su fvzglhe.bayiwkvne.jtgfup /sbin/su fvzglhe.bayiwkvne.jtgfup -
pid Process 4308 fvzglhe.bayiwkvne.jtgfup -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fvzglhe.bayiwkvne.jtgfup/app_picture/1.jpg 4308 fvzglhe.bayiwkvne.jtgfup /data/user/0/fvzglhe.bayiwkvne.jtgfup/app_picture/1.jpg 4308 fvzglhe.bayiwkvne.jtgfup /data/user/0/fvzglhe.bayiwkvne.jtgfup/files/b 4308 fvzglhe.bayiwkvne.jtgfup /data/user/0/fvzglhe.bayiwkvne.jtgfup/files/b 4308 fvzglhe.bayiwkvne.jtgfup -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts fvzglhe.bayiwkvne.jtgfup -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ fvzglhe.bayiwkvne.jtgfup -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fvzglhe.bayiwkvne.jtgfup -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground fvzglhe.bayiwkvne.jtgfup -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fvzglhe.bayiwkvne.jtgfup -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver fvzglhe.bayiwkvne.jtgfup -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal fvzglhe.bayiwkvne.jtgfup -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo fvzglhe.bayiwkvne.jtgfup
Processes
-
fvzglhe.bayiwkvne.jtgfup1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4308
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD51f6ae48b7f5c11155c2881b186453942
SHA180ef6bdbb6f72df5807d4c88831b109b4a5e6a35
SHA256f12efd2f476e4871af8902dbff5793f8df25bb3e7a3eb5887a5b6f29f436eaec
SHA5124c39d50a2bc0c7ac441a829ca5e4e4d5965a3c0b38d37f92d90e09bdae670520c7897969b709a1aca06569c469cc73b391c23dfe4208b054ded82eb80554258d
-
Filesize
444KB
MD530f751eae6b8449889a286bb98c39cd4
SHA1699fdbbe8463cce2626f7b8b3f9fc31d69c97363
SHA256b4722945049d7b5bdca36f5a7a806f58a92d008df7108e751876906be30c6ccf
SHA51274a3ea55a4d8ece49e94d4d27dd735fd017a2f5443f04de595fa678e39cde1d2cf4c856e3cee227b71af2cb16984f1dcaaaba0a29dd49ec6ed2cdd3f19df7333
-
Filesize
169KB
MD5d5db5240bc0d440edfb93baca6dbada5
SHA15e2ac5a54ea6f539265087e305debb76feb3f0db
SHA256a950ee71de53155f29ef03a2a8a7164b7722cd93a0d4232df681c2ed74be26d6
SHA5123ece42441a657c21c971380a6836ac1643eb8021536d9393f97ca1b6ebbd26725e1503570343070cc87f26e0d31fe01eb70e47dfd783989a8c81e01bb0da38f0
-
Filesize
36B
MD5e30d6234928dbc6793a89f449756ed6d
SHA197eda494dc4992a1e1b31900eb633030dcced6dd
SHA25608366ce625f360805d4487321a40f9a82e4fa6b2d8e9c0ab96af2a615ef837fc
SHA5127209f31d8c09147ed7fcb5e04eec79c4d3c777cb3ef636774a3b79662e929626e14585c8ba1a2dfc7b71cd30f6d64f12b610f1f4f5a752825e5d12557c72520a