Analysis

  • max time kernel
    179s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    20-08-2024 22:02

General

  • Target

    114d0f1843adc652126d733d472fe49ceea7c03e824025719dabe301c621dffe.apk

  • Size

    440KB

  • MD5

    ef3a6e3e885952d757723b5b1a978dac

  • SHA1

    d410f3e970f85ed4d9a2ed293d6de5ebb8773fc3

  • SHA256

    114d0f1843adc652126d733d472fe49ceea7c03e824025719dabe301c621dffe

  • SHA512

    d8915dec7a04afe9a834248a52f302d20bf51de8b02e0834e3c21aa0509d7c139cb1044fc83888e2ce009f329ea9a8aca0500a7d4a51421a91469f8c56e866e5

  • SSDEEP

    12288:3rJbiHZYomRfdWlXppDcezv+R5zWtk8C77:3cZYomSlXoezv+586

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • m.mdlqk.eqefj
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4313

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/m.mdlqk.eqefj/files/d

    Filesize

    454KB

    MD5

    70981e80e0fc7d5b58e1e133839e0bcd

    SHA1

    bbd65ce41ca1f65e1646ce902dde824302f7714c

    SHA256

    123d3d05df04c183259f36c78419f0ac8f1e1179e0135611203f11a4f7e16040

    SHA512

    7ab08ee27bfc747dc59ef95ccc0abc60f95e11e921a99b53ffd68aba9321679cdf5c7fa4ad23c738cab2191a06827e9471ab206a1e80d57eaa731fc319e0010c