Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    02-09-2024 22:02

General

  • Target

    7db17a72d2079952528ca4fee1bd83a9268aea1ddf3ab23367ee5c6ed1bb82f0.apk

  • Size

    209KB

  • MD5

    614194af2a51d915bccb5128ad5fafbf

  • SHA1

    5ab24d519a3233fe1c8c77b5cf2edc34a22b2082

  • SHA256

    7db17a72d2079952528ca4fee1bd83a9268aea1ddf3ab23367ee5c6ed1bb82f0

  • SHA512

    8d3ac15de06b560d16561bfd3056f3f5205f7b347653c06f38d226924e35f77668ef47962d4bc482dc798db63b7ed82c3a8210d361f87d5ea42bdc1dedb7e53f

  • SSDEEP

    6144:kHKWBhkvcvXMopjF7RTjo5hyhu9GS5KRla:tWEvEB7RTihSmwRla

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • v.hdiw.kzgp
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4347

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/v.hdiw.kzgp/files/d

    Filesize

    453KB

    MD5

    303ba9f99e501b9d01b3c4e8036f7995

    SHA1

    53196b13f94d7797527cc57742ce6d7b62aae36e

    SHA256

    9614110dedb36006ad490df5f5ab55975d8c7ea20c24f4a6479b9da8a946e7f0

    SHA512

    ef95d56bd53bc3098985a279922657d66d08912bbfe1b5e5c7adb3c4d6267e79ecea28c15036ae023b3c1b052cca9e3111f9a868f7f4178f14db7eaa297e432d