Analysis

  • max time kernel
    11s
  • max time network
    185s
  • platform
    android_x86
  • resource
    android-x86-arm-20240611.1-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system
  • submitted
    13-06-2024 01:43

General

  • Target

    87669eaef4ee9e5ad798581d6f6e44fc2eca0ff8dd4128b68e573202bcfd1bd9.apk

  • Size

    436KB

  • MD5

    0385874b01c3944f75d86750d1384e56

  • SHA1

    31a19d0ac5f3ff6d6c3b947817a9665cb508aaa0

  • SHA256

    87669eaef4ee9e5ad798581d6f6e44fc2eca0ff8dd4128b68e573202bcfd1bd9

  • SHA512

    37db1d8139e071fe17cc8dad6ac67d98ec261a0e051b75c7f7ac00b74af8ad5c261188d5b58b06defd93cce9594f33a18eb21c92bcec6d187407ca3be7eb6fb6

  • SSDEEP

    12288:mCXpJCxfw8UAcWyysVeDaNju9+HkAbtT4qok:1OxpUys7udAb7

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Checks the presence of a debugger
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • xwvecuh.panrgrdxb.xncgal
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4202

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/xwvecuh.panrgrdxb.xncgal/app_picture/1.jpg

    Filesize

    163KB

    MD5

    ac37ffa9c3fa103c8a66a55441a5945f

    SHA1

    90abd957b19bb284ae97d08d1cefccac6c95605a

    SHA256

    9df1675d3d6c4331b2f8b6ce6f3cb50f1f67ffbd1ad672c6784b5554b12bbd03

    SHA512

    e220efdefbd78d75537c3944908c1d77825197959a475ed3b0466b426597708736eedd224cd40d5734d0ed44f236d7540210ccb5052490f48494fe9b9e3fbc9c

  • /data/data/xwvecuh.panrgrdxb.xncgal/files/b

    Filesize

    444KB

    MD5

    5052e382193805f854a17470afdeadc8

    SHA1

    e434b19018b8d0a14c3db4b47318a9e92e9f5148

    SHA256

    6eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a

    SHA512

    be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    0fd4e0c79b7f3eb5149ea5b7854b1af6

    SHA1

    2c0a934d06be5de1be96f065d1da123a52084cbc

    SHA256

    46fd601c91b361466c3bdbb0451c6f618dd4e717e39afe7815bf223b5e3eb894

    SHA512

    80031b1a3ca7e2281f1663429a9e69eb0161125534a4594768f30659fa2d2d8c1940b2f45748b42d76dcfb9c4581bdb9567903c0ccd9f9e461081430842659f2