Analysis

  • max time kernel
    179s
  • max time network
    184s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27-06-2024 22:04

General

  • Target

    b875ded8d39c635e31cb581a03f4900d659f4b5daa9dd3108e2f8630c5e2a19f.apk

  • Size

    412KB

  • MD5

    7bf7d89590d9fd51300815a5dd606301

  • SHA1

    b91cfa234f3fc6ea3d485aae40b4e260a448a6ab

  • SHA256

    b875ded8d39c635e31cb581a03f4900d659f4b5daa9dd3108e2f8630c5e2a19f

  • SHA512

    767fdfe99ec542b3744e91158b3171ce4ed5d39a9bbcd0ffbf05fcbc20f8933ec526dbe6be262cb2fbe38e5dada5883e15e3dcea6ab127f630e6102bdb7b97f4

  • SSDEEP

    12288:bDNUHiiQDhu0vUEbqmEYxk9nn1aNn7/+ld:P+HiiQFvUE+Jp+/+7

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • undpydp.qwaojxcvt.crzjbe
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4310

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/undpydp.qwaojxcvt.crzjbe/app_picture/1.jpg

    Filesize

    167KB

    MD5

    e62629fefd9a0a29d68dfaf7329440f9

    SHA1

    71ef69fa95386a9260cbf9001e15eabe4be24d2f

    SHA256

    ab18c88b9832832f5541bfba844bfc842ca718c2789e0f091ed72338c5751f66

    SHA512

    bff56a01bf8c58a5b5a6294b6961543fac0f687b7bf10561270955057884ea9a1b990e00a8b4e42a0c4087f54c10dbfc1b4f048b7c3ff174fd50fbcd465e4483

  • /data/data/undpydp.qwaojxcvt.crzjbe/files/b

    Filesize

    446KB

    MD5

    5daa1f3756c6785b25d466ca6b7bdc50

    SHA1

    ad6a6880ad1b812434e5bd3b2c1717ba11b54cf6

    SHA256

    a1695cf685fbf9712a67bbc7f9bf82c6d6fe5f8ef185f1ede33fcb76526143c7

    SHA512

    2dbeab1cfd8658b6681d3bda791f2fd3f1199c9aee135b1baa1e91abf87d20de221eec1027f611356781b7c6dbb823b8b157509ced30b03a62f6842fbde0e7e9

  • /data/user/0/undpydp.qwaojxcvt.crzjbe/app_picture/1.jpg

    Filesize

    167KB

    MD5

    f62071824b31cc4f9e2998a9c17df6fe

    SHA1

    4575bdfffd7474e39613adea085c7185fbd41dd3

    SHA256

    0a6fc3cee6222b801a450b696bcec9474e95ac3bf74b47b738482b4a79147ce3

    SHA512

    674eb2a2bfbbdc0fec11eef6233a6419f0448e3cecd533ddb83492c26a01957eea63fbde9666ecc524630698d617dc90ddeb523c150808a3361f8b8119e4f6ac

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    ac8a95e0ec308fb4c3bacc8efc7bcf4b

    SHA1

    4ad83faf43b1f8e6c64535ff3f17aa957128551c

    SHA256

    8dc3b2bd62d907342b3bc8442b2f4ecc1748a45e873c351c3c5b4b0e27d8caf8

    SHA512

    8829c7e2062f5ffea97ff3c4b7cc93765349aa44eb3c6d345bd1e46031863b0160f859b5abdd28b905a36e9df078d12ffd5d518a4e44b2a230c340bf82af3683