Analysis
-
max time kernel
179s -
max time network
142s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-08-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
f5a520309af04ce86829a5a5f36f42ef196f2105b1937b67d27ef51aeffbd354.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
f5a520309af04ce86829a5a5f36f42ef196f2105b1937b67d27ef51aeffbd354.apk
-
Size
208KB
-
MD5
77518dc071a3ea3cd8d5204f82317d26
-
SHA1
292c682167ae494ffe0ad7f64ae233ac331ef6c5
-
SHA256
f5a520309af04ce86829a5a5f36f42ef196f2105b1937b67d27ef51aeffbd354
-
SHA512
64c2410bbb27304185dc34bf2978b40e58548a1846f9dc8b95b5cd1415a57a95362f09bda9fedd3ab6c12e4a45b186c6ec3d571c88b56e40d922a2e6a926700a
-
SSDEEP
6144:8Zfa9/aXPTICKhC5sX50AYuFMs4TlIZSj9Pkocy46fylX:8ZfWSXPT6hnSBS4m/ocFlX
Malware Config
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/bin/su izhl.wmul.irn -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/izhl.wmul.irn/files/d 4356 izhl.wmul.irn -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ izhl.wmul.irn -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock izhl.wmul.irn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground izhl.wmul.irn -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT izhl.wmul.irn
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD510a6cd11fd5324816acd309bd03d0fc6
SHA1f48b99cb0b956cd6aa1c49520cecbd54655ab070
SHA256dba87282729d77187bdd8e45674547de8d0025fd25dbf87355ccc37446c36502
SHA512ac21fb9b540e7baad02e5ef0d9b763169197904bc8d1a7168dbe37e7403af69c81cea2d18fef85f3ddbc361bb202085a7bdd44ce23db14dd3f0effc1dddb7c77