Analysis

  • max time kernel
    3s
  • max time network
    187s
  • platform
    android_x64
  • resource
    android-x64-20240611.1-en
  • submitted
    20-06-2024 01:13

General

  • Target

    3c571e1af876577c9e2463aa6fe7171d455702392f6f3b4a0423249f4d409208.apk

  • Size

    452KB

  • MD5

    abaa278932de410b1fb76f932e329e61

  • SHA1

    0e312f7dfcff2f17270e555392d39269bdef7c21

  • SHA256

    3c571e1af876577c9e2463aa6fe7171d455702392f6f3b4a0423249f4d409208

  • SHA512

    48ef1e6ad876872d044e8da4dde0369364a73129abecbf0b59f9e8a33046f9fbd771838aed21f452895415a2739fb9cb1f9983a631a947307df45e256194120b

  • SSDEEP

    12288:KE+PfVHuSb68alcATXHKKSz0Xk4LE1innQRZrV:KP3VOSHLqo0XkowVRL

Malware Config

Extracted

Family

xloader_apk

C2

https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36

Signatures

Processes

  • com.qwhf.ttgv
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:5011

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.qwhf.ttgv/files/dex

    Filesize

    781KB

    MD5

    73b9230a0727b26baf79445044cf9c0d

    SHA1

    3c7f917eec8b3e39865c7629ac9af567880ad221

    SHA256

    3db4dfd3242ed9a5f6bc6a777a212f87726c79273eaa876250b931f9a990a208

    SHA512

    9065da8e871f316ba64424f3d3fdd75f3bf3c14298ba6bbaeac70a0e1e2332dc5035b9b513c6242dc6ff539b63297dbad38fd4cf649162df39c924dca408f99c