Analysis

  • max time kernel
    179s
  • max time network
    160s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    12-08-2024 22:07

General

  • Target

    3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.apk

  • Size

    209KB

  • MD5

    822e7ee4c557875e804bf741dafd7ffe

  • SHA1

    681615035c68c52140f026a9550ec955f76ad860

  • SHA256

    3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b

  • SHA512

    ef82cf318c46243589f17635a5695b1b1a4ac7cb9c8be083a51360665887122fb50c60eded4fca4ef226d70493cc3e5463684b703b90429da108dacfa09bc6e1

  • SSDEEP

    6144:ecUrN6yCCmo59n6VP1GIT9gVjX//oCsUe:MwbE69GkSv/oCDe

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • b.dcxnx.dqtt
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4325

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/b.dcxnx.dqtt/files/d

    Filesize

    453KB

    MD5

    62dded91437cc7c895dc49eab14c80f5

    SHA1

    5ba00620dabdb8b8c63d459a951d4850e8d585b5

    SHA256

    f86036172c22e92c8754a06846b5221ef5e957651c100c48205a85e650b3ad81

    SHA512

    8ae828640b439091186e5f929fda51abefd468c3fbd72e02ab2afdfdf0c9c9ebd367b807826b760ea159250a7ef5b1673c92c4db2e696ace6d019b3004d64f5a