Analysis
-
max time kernel
179s -
max time network
160s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
12-08-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.apk
-
Size
209KB
-
MD5
822e7ee4c557875e804bf741dafd7ffe
-
SHA1
681615035c68c52140f026a9550ec955f76ad860
-
SHA256
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b
-
SHA512
ef82cf318c46243589f17635a5695b1b1a4ac7cb9c8be083a51360665887122fb50c60eded4fca4ef226d70493cc3e5463684b703b90429da108dacfa09bc6e1
-
SSDEEP
6144:ecUrN6yCCmo59n6VP1GIT9gVjX//oCsUe:MwbE69GkSv/oCDe
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/bin/su b.dcxnx.dqtt -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/b.dcxnx.dqtt/files/d 4325 b.dcxnx.dqtt -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ b.dcxnx.dqtt -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock b.dcxnx.dqtt -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground b.dcxnx.dqtt -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT b.dcxnx.dqtt -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal b.dcxnx.dqtt
Processes
-
b.dcxnx.dqtt1⤵
- Checks if the Android device is rooted.
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests changing the default SMS application.
- Uses Crypto APIs (Might try to encrypt user data)
PID:4325
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
453KB
MD562dded91437cc7c895dc49eab14c80f5
SHA15ba00620dabdb8b8c63d459a951d4850e8d585b5
SHA256f86036172c22e92c8754a06846b5221ef5e957651c100c48205a85e650b3ad81
SHA5128ae828640b439091186e5f929fda51abefd468c3fbd72e02ab2afdfdf0c9c9ebd367b807826b760ea159250a7ef5b1673c92c4db2e696ace6d019b3004d64f5a