Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    30-08-2024 16:12

General

  • Target

    cb2f3fe79af372a7160221cd08919488_JaffaCakes118.apk

  • Size

    429KB

  • MD5

    cb2f3fe79af372a7160221cd08919488

  • SHA1

    2996e4eef9bebcbbbd95a85f57cdaabe358317c5

  • SHA256

    9cdac556a51a31aeb05abcf3a90cc0d2f91380b055110e85710164c330493927

  • SHA512

    23c3b420d198311b0266818f774bc848d07386d8075b0064000252425e9e7121a2c851018bf8713b502bddff709567ead26b0803435d8b38375a747dbd6a33ff

  • SSDEEP

    6144:wptPJ32BHu2PyQSnFACZ8nTiR9SsKXfLBZD3fGnm4HiN5lAtQLmrkRFfs3ZU:URJ32M26Q0FACZEz5LBZraHY5pLmf3y

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • com.soqr.asxq
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4520

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.soqr.asxq/files/dex

    Filesize

    763KB

    MD5

    44d6b4327a543a21d3c55a45018ccda2

    SHA1

    395f521260820fd5de49298d3355becf6730b7c1

    SHA256

    1d73e451a41adb1a700dc6dd53a844e9a2ea72fd5dcde35c7b3ac8a7953764bb

    SHA512

    c2cf475214b7c6275698740f56a80d9e1cad53b2adb88cc9ffb895199e1d6993e48efba090f7828d4309b6ae2d9f4bde816d4213be3d8b1f3ccb836a2616a55e