Malware Analysis Report

2024-09-09 13:08

Sample ID 240627-1xdt4awcmj
Target 36a09f8ea330676ffe548123d91d8569f1cea795655b90cf999282795acade5f.bin
SHA256 36a09f8ea330676ffe548123d91d8569f1cea795655b90cf999282795acade5f
Tags
xloader_apk banker collection discovery evasion impact infostealer persistence stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

36a09f8ea330676ffe548123d91d8569f1cea795655b90cf999282795acade5f

Threat Level: Known bad

The file 36a09f8ea330676ffe548123d91d8569f1cea795655b90cf999282795acade5f.bin was found to be: Known bad.

Malicious Activity Summary

xloader_apk banker collection discovery evasion impact infostealer persistence stealth trojan

XLoader payload

XLoader, MoqHao

Removes its main activity from the application launcher

Checks if the Android device is rooted.

Reads the content of the MMS message.

Queries the phone number (MSISDN for GSM devices)

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Loads dropped Dex/Jar

Queries account information for other applications stored on the device

Requests disabling of battery optimizations (often used to enable hiding in the background).

Requests dangerous framework permissions

Reads information about phone network operator.

Declares services with permission to bind to the system

Makes use of the framework's foreground persistence service

Acquires the wake lock

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-27 22:01

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-27 22:01

Reported

2024-06-27 22:09

Platform

android-x86-arm-20240624-en

Max time kernel

179s

Max time network

184s

Command Line

pofosqi.sglvfwzsr.nbamfj

Signatures

XLoader payload

Description Indicator Process Target
N/A N/A N/A N/A

XLoader, MoqHao

trojan infostealer banker xloader_apk

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /sbin/su N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/pofosqi.sglvfwzsr.nbamfj/app_picture/1.jpg N/A N/A
N/A /data/user/0/pofosqi.sglvfwzsr.nbamfj/app_picture/1.jpg N/A N/A
N/A /data/user/0/pofosqi.sglvfwzsr.nbamfj/files/b N/A N/A
N/A /data/user/0/pofosqi.sglvfwzsr.nbamfj/files/b N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccounts N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Reads the content of the MMS message.

collection
Description Indicator Process Target
URI accessed for read content://mms/ N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Reads information about phone network operator.

discovery

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

pofosqi.sglvfwzsr.nbamfj

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.213.10:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 m.vk.com udp
RU 87.240.137.164:443 m.vk.com tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp

Files

/data/data/pofosqi.sglvfwzsr.nbamfj/app_picture/1.jpg

MD5 625f9511d31219caa9895a96cd57818b
SHA1 0a35670614fb6b66657e87301656fc7c160dd426
SHA256 6c59a7b902d1e528a218bf6e8f3ccd855077db435c98f6e7a695787d941b3e55
SHA512 6b9c1906596ca818224147189e0d746a5d9c70c9f0d8b7f6f2a9834533f63574dc7aa6d0a1de4ab188859126192a13cee1ebd9122de37c0fbdd73e3db0ac62ed

/data/user/0/pofosqi.sglvfwzsr.nbamfj/app_picture/1.jpg

MD5 bacb86a598b5cff21a985a0424979015
SHA1 a99e2fa4445372c651f86886264bd0a1e1c04aa9
SHA256 b94cc35d4d2f278d790bbc56608c1c53ac110f37d51b593f2dd56c3f74e21662
SHA512 da642307c9ac9e97db02af661ea3c0b7deaed72bb821230b51a898cc97a4d5d2cb41f4d277220e21f246cb17044df5432d52b1795cc5650520d3973886167631

/data/data/pofosqi.sglvfwzsr.nbamfj/files/b

MD5 5daa1f3756c6785b25d466ca6b7bdc50
SHA1 ad6a6880ad1b812434e5bd3b2c1717ba11b54cf6
SHA256 a1695cf685fbf9712a67bbc7f9bf82c6d6fe5f8ef185f1ede33fcb76526143c7
SHA512 2dbeab1cfd8658b6681d3bda791f2fd3f1199c9aee135b1baa1e91abf87d20de221eec1027f611356781b7c6dbb823b8b157509ced30b03a62f6842fbde0e7e9

/storage/emulated/0/.msg_device_id.txt

MD5 df08bee08eede46dcf1b77bbb13de49a
SHA1 ef2f13b3b9b8b0fe190a492afe33dc0a36d3bafc
SHA256 5d97e6fb17a0d61cc5a95c4251c05a019b5cfc44139c0b46c3946b75c2448659
SHA512 e2221f28d2dd447fa037e52ca7336d43378fdebbf5165e0b6d89fd6377347cefa07dd275a0431d07f7184a17f566a146bc4611af2f2aea96b1258fedc34a59bf