Analysis

  • max time kernel
    179s
  • max time network
    163s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    03-08-2024 22:11

General

  • Target

    713644904fb37cd222495f8616ae02fbe40aae1899bc5146b69d39a655feab61.apk

  • Size

    442KB

  • MD5

    5199e960c34a6bae9220d5c389ef9e28

  • SHA1

    f944789ec55dd67cab7967da71d37ac6df36b756

  • SHA256

    713644904fb37cd222495f8616ae02fbe40aae1899bc5146b69d39a655feab61

  • SHA512

    e776f9585e95fa3a39502b92ba5fc822e21882c94977ef590daeb7b4f86cc8300096e55c4736d9e4283cc8a803a693feb559fbe104dc9d3ef8ec0e04fd9e8070

  • SSDEEP

    12288:dDm1VYHOV/w7UNCLsvglDfBsS+b4dMoYV:dDmzYa/w7UoqciS+cdM5

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • com.hlwi.nlyn
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4640

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.hlwi.nlyn/files/dex

    Filesize

    766KB

    MD5

    7962ea579bddfb2d56deaeb75556d33a

    SHA1

    292c29c70d73caff3148eb993fc389c58b966cde

    SHA256

    ff87cb92852a7d77c93494f73a3876fb3c3570115ffe73c2fcd08ae3ac1e3551

    SHA512

    bad435e79acad4d6c25ea5a580a12dde0e065a85677744c6428bf20ee03a55972d20416ca719f9254be886f20a00c2cd3e4816911e05ebab199e398bc4c6a0f4