Analysis
-
max time kernel
179s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
aca3789cfc2a87ce8ac64ad9be9f518961b47b7e579b6a0203484133b3f354b5.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
aca3789cfc2a87ce8ac64ad9be9f518961b47b7e579b6a0203484133b3f354b5.apk
-
Size
436KB
-
MD5
806917878f9351276c39eec1ba024f05
-
SHA1
fd6ea9073aedd9c29099e051ff45b45b0495c822
-
SHA256
aca3789cfc2a87ce8ac64ad9be9f518961b47b7e579b6a0203484133b3f354b5
-
SHA512
3f9f08dcf2512ec203d10661fb0fb42a8ab2c0806297d836af1c9cb4414162d09e92c04437a82b3a0082bcf602522bd274595c1df2ee7d6f4529a1d7f492e5d8
-
SSDEEP
12288:Vbf+lRcQAcWyysVeDaNju9+HkAbtT4q1P:VD+lRcwys7udAbnP
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule /data/data/qzyrpuh.rsbjonoib.ffjexg/files/b family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgioc process /system/xbin/su qzyrpuh.rsbjonoib.ffjexg /sbin/su qzyrpuh.rsbjonoib.ffjexg /system/bin/su qzyrpuh.rsbjonoib.ffjexg -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
qzyrpuh.rsbjonoib.ffjexgioc pid process /data/user/0/qzyrpuh.rsbjonoib.ffjexg/app_picture/1.jpg 4287 qzyrpuh.rsbjonoib.ffjexg /data/user/0/qzyrpuh.rsbjonoib.ffjexg/app_picture/1.jpg 4287 qzyrpuh.rsbjonoib.ffjexg /data/user/0/qzyrpuh.rsbjonoib.ffjexg/files/b 4287 qzyrpuh.rsbjonoib.ffjexg /data/user/0/qzyrpuh.rsbjonoib.ffjexg/files/b 4287 qzyrpuh.rsbjonoib.ffjexg -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Framework service call android.accounts.IAccountManager.getAccounts qzyrpuh.rsbjonoib.ffjexg -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process URI accessed for read content://mms/ qzyrpuh.rsbjonoib.ffjexg -
Acquires the wake lock 1 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock qzyrpuh.rsbjonoib.ffjexg -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground qzyrpuh.rsbjonoib.ffjexg -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS qzyrpuh.rsbjonoib.ffjexg -
Checks the presence of a debugger
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Framework service call android.app.IActivityManager.registerReceiver qzyrpuh.rsbjonoib.ffjexg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
qzyrpuh.rsbjonoib.ffjexgdescription ioc process Framework API call javax.crypto.Cipher.doFinal qzyrpuh.rsbjonoib.ffjexg -
Checks CPU information 2 TTPs 1 IoCs
Processes
-
qzyrpuh.rsbjonoib.ffjexg1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/qzyrpuh.rsbjonoib.ffjexg/app_picture/1.jpgFilesize
169KB
MD53d9b73c7d5bb5fa602163dc066dec44f
SHA1781b6e30173011683b5fd0e814555d6cbbc351f9
SHA256241f08f72338335a847d46b0e1b878011d235e0b91c74a0c9f43d2576be1186e
SHA512c5531d4dc644d9f0203ec4ecd4585e163bd6e166fc70263a8bdbe00ca3ba6fb196c06b6676fe2da85e5c2ec64574bcaea94c17b755c33979de5df9361c3c4a63
-
/data/data/qzyrpuh.rsbjonoib.ffjexg/files/bFilesize
444KB
MD55052e382193805f854a17470afdeadc8
SHA1e434b19018b8d0a14c3db4b47318a9e92e9f5148
SHA2566eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a
SHA512be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7
-
/data/user/0/qzyrpuh.rsbjonoib.ffjexg/app_picture/1.jpgFilesize
169KB
MD5ed90d05ac009d43869133145dbd0f257
SHA104163c62eaabaafb7b1fa2b389e40af664f8288b
SHA2562e66af83212c1f646e29845f9163015f15109d42b2ac563bdf7be84375a319a1
SHA51298bd9ee511d9899766b0b8492505819980e8d61f9adc621be83ded2b5651abe655ebb82e5de58f02699c6072fd30e03d8b6c588733d60f22645d7af17e7fcf71
-
/storage/emulated/0/.msg_device_id.txtFilesize
36B
MD58744e1684dc91faed0bceebd66e55a48
SHA19d4048ac5897def67792e57402818d03d43e62c7
SHA256e690f3e604a84c51f1f9bacf0c267fa4a8e74132c68bcec1903caca0535236d2
SHA512ac94e7da94ce874f5f18e55b14540415b0ef055e5bad31c28a6c34123d33208b6bde08140729749becea89d8ad7e258b437fe9d2fd4728c9266368d00a952894