Analysis

  • max time kernel
    179s
  • max time network
    184s
  • platform
    android_x86
  • resource
    android-x86-arm-20240611.1-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system
  • submitted
    13-06-2024 00:05

General

  • Target

    7eb88daf531b4e1d2027bf9f00fcf5d0115c6dc9d9e2106ad0bff9a2edd86795.apk

  • Size

    436KB

  • MD5

    49ea689a939a98721f1526d99afe0403

  • SHA1

    f9c06b9bd69d84d3b1b69460502c2f74a1e8d95b

  • SHA256

    7eb88daf531b4e1d2027bf9f00fcf5d0115c6dc9d9e2106ad0bff9a2edd86795

  • SHA512

    9f5071e11e8c31fa4aa65dad66521f64cb47ff565421b58b2a67b5398f836d658e07557bfee1d98904a29c33b3125543953127a18075c8cc7ce0d78e17a2fd2e

  • SSDEEP

    12288:oAcWyysVeDaNju9+HkAbtT4qI5avVdABCgBZw9iiv9:4ys7udAbiUvAhBoj9

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Checks the presence of a debugger
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • jofbeda.rotojgefz.deqvmj
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4317

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/jofbeda.rotojgefz.deqvmj/app_picture/1.jpg
    Filesize

    168KB

    MD5

    d855e8a9754e0c905076e3b1a47926f5

    SHA1

    518b6db786e0d46a37077ff71237bf18229c65c3

    SHA256

    c391dcf9c2ddf6d9b59a39bf8b12a5d4efb2dd5535d17ff9562d688dacb553f3

    SHA512

    ecfbd26f87316ac99d210a70a882b708cfb94eb535010b9476c47d1d2ddf597f1cbe06440b8937a67705a72cd1c0e506ba7af49d148563bee6fafe2f0d69d691

  • /data/data/jofbeda.rotojgefz.deqvmj/files/b
    Filesize

    444KB

    MD5

    5052e382193805f854a17470afdeadc8

    SHA1

    e434b19018b8d0a14c3db4b47318a9e92e9f5148

    SHA256

    6eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a

    SHA512

    be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7

  • /data/user/0/jofbeda.rotojgefz.deqvmj/app_picture/1.jpg
    Filesize

    168KB

    MD5

    ee57ff47ffe4ae76dc86118db532d7cb

    SHA1

    732c10b08374e06290fa78c1469c9e9d750693e2

    SHA256

    67f2a0dcc738df949672e74a0dea89539a6a2429d0150e9e924362341bbf9e3f

    SHA512

    f7e4ca214fd33dacb8138d968904b95c91903f3f3d94841807ceaad3f202e70fcb4f11c39c0a7f8f74b092fbbfa9518c65e7a85cb2e1540966a4e4113ef3ca8f

  • /storage/emulated/0/.msg_device_id.txt
    Filesize

    36B

    MD5

    b50fc1cabfcc0fba266b90ad83b96c6d

    SHA1

    28a4d18749a4a0475e394fbf15f7bdfecbcbffde

    SHA256

    fac7e3e10c2048b335beb2ea5316bd644a8254eb12649d1f548b3035cbbacaf3

    SHA512

    b5fcbc5f6f7d2ac7da4f558e5bd4aa98022c25249c8f2e05c4e9b77321fcf8c8df19a9f6aefcce2d4b8f439ac818744ec75bf90516c93e4a8f5331caec5700df