Analysis

  • max time kernel
    179s
  • max time network
    184s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    29-06-2024 22:04

General

  • Target

    81b78151f63a2ef76d9624b198573b637825823d0fc5838e39ae9bf89d1ae697.apk

  • Size

    408KB

  • MD5

    79c87ff4a33c0932c07ab99e037e284c

  • SHA1

    d48220439cd25d0ea15c9d314c602e1549d1fa72

  • SHA256

    81b78151f63a2ef76d9624b198573b637825823d0fc5838e39ae9bf89d1ae697

  • SHA512

    f1464dd1db90fb06d50bb26192f0d730035e2f1a6285828a406c05e66265a46ea2588b84a4c93d714e57068b65b341a01df1e0729aa7594f43e4082d0d0a78ea

  • SSDEEP

    12288:hhVA0hGz3wDNUHiiQDhu0vUEbqmEYxVtJ:hhbhGz6+HiiQFvUE+Jm

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • dmdlknd.vtifhemaw.pvsmbd
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4303

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/dmdlknd.vtifhemaw.pvsmbd/app_picture/1.jpg
    Filesize

    166KB

    MD5

    8916bfb186f41b4fe65a78a321f2d2f7

    SHA1

    4216e508863cf137eb8d35c0bbfc25b180e5a7e1

    SHA256

    022e78a0d96236a2e8d1b4cf0a14b34411a12d47ce84fbfaa77f40d13580436e

    SHA512

    3b93b305295bb7aa3e07f7e4bbf8d2b081370829ef1fb0869ec8a1685ba04cd2b6d0a6eaac73a58c3934c666451fe4a943ec40e07e7e5fbc54cdcc1ed581f11c

  • /data/data/dmdlknd.vtifhemaw.pvsmbd/files/b
    Filesize

    446KB

    MD5

    5daa1f3756c6785b25d466ca6b7bdc50

    SHA1

    ad6a6880ad1b812434e5bd3b2c1717ba11b54cf6

    SHA256

    a1695cf685fbf9712a67bbc7f9bf82c6d6fe5f8ef185f1ede33fcb76526143c7

    SHA512

    2dbeab1cfd8658b6681d3bda791f2fd3f1199c9aee135b1baa1e91abf87d20de221eec1027f611356781b7c6dbb823b8b157509ced30b03a62f6842fbde0e7e9

  • /data/user/0/dmdlknd.vtifhemaw.pvsmbd/app_picture/1.jpg
    Filesize

    166KB

    MD5

    d1c30ef6969add61b6c25931276c9d4a

    SHA1

    48846e3b5eab068eb895f15ccbda44bbf01e62d0

    SHA256

    e22271145507dc5d24fdc4f2f2b97a4b3946fadabcfdd0ba298ff957f6f2b644

    SHA512

    d4534b1a025ced87dc3eb132bfd7fc325b9286ed6bd80727869927e1df68dd3147ec8bf502e1e87b19a33017c3191207850cf39c7e2abd4bd3e427fcc777406e

  • /storage/emulated/0/.msg_device_id.txt
    Filesize

    36B

    MD5

    9ef0917fbf91f7d09e562e028a7432ca

    SHA1

    6681d8aa25de39c7d8fe14d1b4e81e730f6b0ca8

    SHA256

    3268698db30d6e998df8e2caaabcfa8e45eb3d3f6d86ac4e60aff8fdb4440e3c

    SHA512

    96a278c8db95573500250df54146ea45312041daf95fc9f20741940923b9a0549c11211d7d9e3861a6f1c54a693e33cdbc0b679798c69c8093ff53be8f70ad5b