Malware Analysis Report

2024-09-09 13:03

Sample ID 240629-1ytxps1bql
Target fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593.bin
SHA256 fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593
Tags
xloader_apk banker collection discovery evasion impact infostealer persistence stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593

Threat Level: Known bad

The file fcfbcfc0ad17366fda9e0fac53b35f952159ba352777016c27a5fd853a6c9593.bin was found to be: Known bad.

Malicious Activity Summary

xloader_apk banker collection discovery evasion impact infostealer persistence stealth trojan

XLoader payload

XLoader, MoqHao

Removes its main activity from the application launcher

Checks if the Android device is rooted.

Loads dropped Dex/Jar

Queries the phone number (MSISDN for GSM devices)

Reads the content of the MMS message.

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries account information for other applications stored on the device

Reads information about phone network operator.

Declares services with permission to bind to the system

Acquires the wake lock

Requests dangerous framework permissions

Makes use of the framework's foreground persistence service

Requests disabling of battery optimizations (often used to enable hiding in the background).

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-29 22:03

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-29 22:03

Reported

2024-06-29 22:22

Platform

android-x86-arm-20240624-en

Max time kernel

10s

Max time network

185s

Command Line

njunxwe.difmewmqo.segosc

Signatures

XLoader payload

Description Indicator Process Target
N/A N/A N/A N/A

XLoader, MoqHao

trojan infostealer banker xloader_apk

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/bin/su N/A N/A
N/A /system/xbin/su N/A N/A
N/A /sbin/su N/A N/A

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/njunxwe.difmewmqo.segosc/app_picture/1.jpg N/A N/A
N/A /data/user/0/njunxwe.difmewmqo.segosc/app_picture/1.jpg N/A N/A
N/A /data/user/0/njunxwe.difmewmqo.segosc/files/b N/A N/A
N/A /data/user/0/njunxwe.difmewmqo.segosc/files/b N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccounts N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Reads the content of the MMS message.

collection
Description Indicator Process Target
URI accessed for read content://mms/ N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Reads information about phone network operator.

discovery

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

njunxwe.difmewmqo.segosc

Network

Country Destination Domain Proto
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 m.vk.com udp
RU 87.240.132.72:443 m.vk.com tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
RU 87.240.132.72:443 m.vk.com tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.14:443 android.apis.google.com tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp
KR 91.204.227.50:28899 tcp

Files

/data/data/njunxwe.difmewmqo.segosc/app_picture/1.jpg

MD5 fadcb881a1768e719a124cef2077c32a
SHA1 429dce341245127d1e26ba945b14ffafde652e4e
SHA256 8bb2bd3bb47df23785deb44128f348bde50efba9524e3574be0b3fbc2b0fb75d
SHA512 8f9a09b7c6db8fd85caeb4ebcdbb963e325e43c40c2f59ee54934ce0b0df8d197f90fd4902c0c8179c9d82a8c76ef14474f379b9236c1edc198369819fc43cd8

/data/user/0/njunxwe.difmewmqo.segosc/app_picture/1.jpg

MD5 abe4f009d6299b4630e5a77e87fb8033
SHA1 a2e293917db88deb8ae4c54a0c7422fa80f004c7
SHA256 765fd8554cdd23886eb96d8745e227541211a7d7cdb5b58373fd6d27893a98fb
SHA512 f2aed54273f2c0a35b8e1cdc2d6f376a81fe6538d423e39d885f9bd506e2e11fff402be8c08260c27a1e619983f9e30165776936a35efbf179c2923aa629b4be

/data/data/njunxwe.difmewmqo.segosc/files/b

MD5 5daa1f3756c6785b25d466ca6b7bdc50
SHA1 ad6a6880ad1b812434e5bd3b2c1717ba11b54cf6
SHA256 a1695cf685fbf9712a67bbc7f9bf82c6d6fe5f8ef185f1ede33fcb76526143c7
SHA512 2dbeab1cfd8658b6681d3bda791f2fd3f1199c9aee135b1baa1e91abf87d20de221eec1027f611356781b7c6dbb823b8b157509ced30b03a62f6842fbde0e7e9

/storage/emulated/0/.msg_device_id.txt

MD5 561d11be5669fc2e3adb294b9c985aa3
SHA1 65bc14ef122485006103c7451d7d630773a041d1
SHA256 553ec435323561cfff9a2bdb4a175659a0ea38c9d187a5e5ed44d6055bae2c3b
SHA512 22018803925bc3073001705e0c9d5b451d7f90efd6134bf552f516d6d7e42419782a3b02bf3d782b55c42c6b62d659fd9fe3275a47b7ea5142c2dc20d7de8644