Analysis

  • max time kernel
    179s
  • max time network
    184s
  • platform
    android_x86
  • resource
    android-x86-arm-20240611.1-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system
  • submitted
    13-06-2024 01:57

General

  • Target

    911ddfbe287e97fec4be5da8216da7ac15ee3fc9dfe90aeca74e011b169cd396.apk

  • Size

    436KB

  • MD5

    4398a20f83c769d67e70fee5ea6988f2

  • SHA1

    51a739a6bf20a09d2077ab42db6bba18db7e96d6

  • SHA256

    911ddfbe287e97fec4be5da8216da7ac15ee3fc9dfe90aeca74e011b169cd396

  • SHA512

    a55fd1ce91e9b4268de49096098791f42072a2d1b6f93b9aeb9d3b674137f33e6e529b97867e0a0438f912ca435ba3ac1aa08fb43b1b0d2452b012a3b225f266

  • SSDEEP

    12288:zAcWyysVeDaNju9+HkAbtT4qxSgYTRQWQtCj:5ys7udAb/dYNQDCj

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Checks the presence of a debugger
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • nmrlnwb.cvjjlpmcv.nhwpbf
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4322

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/nmrlnwb.cvjjlpmcv.nhwpbf/app_picture/1.jpg

    Filesize

    166KB

    MD5

    2a62d95e6efbb77d8d5239fdc6bbbc13

    SHA1

    8f347d46d4f76d046b0e7f7c7dc076b7754e5945

    SHA256

    00d0357afebbf2561ac510b65f4a3dbf7e109afa244e607ce7adcf0a6bb67c74

    SHA512

    392c7810896f15cea62dc1a7f00f10b326049ea56af11ad3837f933539543f2700ead2f1b11c1f955909376a53c430e854acecda26945a020fb04febe639f0a4

  • /data/data/nmrlnwb.cvjjlpmcv.nhwpbf/files/b

    Filesize

    444KB

    MD5

    5052e382193805f854a17470afdeadc8

    SHA1

    e434b19018b8d0a14c3db4b47318a9e92e9f5148

    SHA256

    6eac212f3e5d11281f0c7263e5795bd74241b233898280b8cb9479443747f52a

    SHA512

    be6fde561141ceebed2f1c98c845fdf247b10aecd15698130bda158484f02309e336a57e1a19fc740137f919904f0c649fcfed6d659b53b0ae6e97aaf794cec7

  • /data/user/0/nmrlnwb.cvjjlpmcv.nhwpbf/app_picture/1.jpg

    Filesize

    166KB

    MD5

    1d343a7e482175fc03ca6d7cbfb12273

    SHA1

    be7c835053410286c1f9599341afc1e5891a4907

    SHA256

    c8c228fb182881fb272ab662b05028def1621ac6830d785d48fdf5b682c865fa

    SHA512

    5d46cc29ae6e5d937f6136c65038b2c99266b4c03e6e047d431af4d8497551eb2d6b6893e99b71294100d859942fd192e3a484f67c63832d815b9ef483f967a9

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    32eb9ca7d3716bf96886e78870ceedaa

    SHA1

    d92df73d59c8ccdc239ceb88c3b3629a571a52fb

    SHA256

    f0a8ad1432059edd77a4b904d5538b2d24f84a0c9e7a5ed66d56335bf31ae90d

    SHA512

    aca697f531295c403d8db2aa675a878569ed2a8dd00a8595fdd0e0953408701a5034e55930a92c71ae040a7164540a3378ea58d2b10695de9d35e85d60547d55