Analysis
-
max time kernel
10s -
max time network
185s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-06-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593.apk
Resource
android-x86-arm-20240624-en
General
-
Target
fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593.apk
-
Size
412KB
-
MD5
14dc8a71e84e34ac3578006ec863ebe4
-
SHA1
03b10e274ac869a88c5da1a157a1465bf548d5f7
-
SHA256
fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593
-
SHA512
d8ff289d3f526bd70f72a191c564498744c3e8451173093a5dc194885905c87277695bf05456999a3302be713be3338671411cadd40914c2b7bd29de5659008c
-
SSDEEP
6144:ayQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwuPZT7L+DwlojneFDjA1rhj+2:CDNUHiiQDhu0vUEbqmEYxOFHNloKAphl
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su njunxwe.difmewmqo.segosc /system/xbin/su njunxwe.difmewmqo.segosc /sbin/su njunxwe.difmewmqo.segosc -
pid Process 4301 njunxwe.difmewmqo.segosc -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/njunxwe.difmewmqo.segosc/app_picture/1.jpg 4301 njunxwe.difmewmqo.segosc /data/user/0/njunxwe.difmewmqo.segosc/app_picture/1.jpg 4301 njunxwe.difmewmqo.segosc /data/user/0/njunxwe.difmewmqo.segosc/files/b 4301 njunxwe.difmewmqo.segosc /data/user/0/njunxwe.difmewmqo.segosc/files/b 4301 njunxwe.difmewmqo.segosc -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts njunxwe.difmewmqo.segosc -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ njunxwe.difmewmqo.segosc -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock njunxwe.difmewmqo.segosc -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground njunxwe.difmewmqo.segosc -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS njunxwe.difmewmqo.segosc -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver njunxwe.difmewmqo.segosc -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal njunxwe.difmewmqo.segosc -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo njunxwe.difmewmqo.segosc
Processes
-
njunxwe.difmewmqo.segosc1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4301
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
171KB
MD5fadcb881a1768e719a124cef2077c32a
SHA1429dce341245127d1e26ba945b14ffafde652e4e
SHA2568bb2bd3bb47df23785deb44128f348bde50efba9524e3574be0b3fbc2b0fb75d
SHA5128f9a09b7c6db8fd85caeb4ebcdbb963e325e43c40c2f59ee54934ce0b0df8d197f90fd4902c0c8179c9d82a8c76ef14474f379b9236c1edc198369819fc43cd8
-
Filesize
446KB
MD55daa1f3756c6785b25d466ca6b7bdc50
SHA1ad6a6880ad1b812434e5bd3b2c1717ba11b54cf6
SHA256a1695cf685fbf9712a67bbc7f9bf82c6d6fe5f8ef185f1ede33fcb76526143c7
SHA5122dbeab1cfd8658b6681d3bda791f2fd3f1199c9aee135b1baa1e91abf87d20de221eec1027f611356781b7c6dbb823b8b157509ced30b03a62f6842fbde0e7e9
-
Filesize
171KB
MD5abe4f009d6299b4630e5a77e87fb8033
SHA1a2e293917db88deb8ae4c54a0c7422fa80f004c7
SHA256765fd8554cdd23886eb96d8745e227541211a7d7cdb5b58373fd6d27893a98fb
SHA512f2aed54273f2c0a35b8e1cdc2d6f376a81fe6538d423e39d885f9bd506e2e11fff402be8c08260c27a1e619983f9e30165776936a35efbf179c2923aa629b4be
-
Filesize
36B
MD5561d11be5669fc2e3adb294b9c985aa3
SHA165bc14ef122485006103c7451d7d630773a041d1
SHA256553ec435323561cfff9a2bdb4a175659a0ea38c9d187a5e5ed44d6055bae2c3b
SHA51222018803925bc3073001705e0c9d5b451d7f90efd6134bf552f516d6d7e42419782a3b02bf3d782b55c42c6b62d659fd9fe3275a47b7ea5142c2dc20d7de8644