Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    10-09-2024 22:22

General

  • Target

    f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09.apk

  • Size

    209KB

  • MD5

    971c79e84ccfb7e5f00ffc71bd38f418

  • SHA1

    e5c67340461d2420deb9829f8e8ec4bd11e89770

  • SHA256

    f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09

  • SHA512

    5062c8ffcc7e52653d2c792a4a43c0abd93b324e4ef85312e0794b20be86b754de36f37ac7e3f8289d03db3adc14f8e1f580fe171904d88a9d7eef43c40ab856

  • SSDEEP

    3072:8lrPOw2jn+UbOsSOuoNS9mfqmH/4M9dVqAFTH/ZjQcZTLPq7WMQYz3wAMYGEhtrg:yzOw2jn7ysSOuoDxHZPPDUnGEhtrrc

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • j.clg.wsqlo
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4604

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/j.clg.wsqlo/files/d

    Filesize

    453KB

    MD5

    303ba9f99e501b9d01b3c4e8036f7995

    SHA1

    53196b13f94d7797527cc57742ce6d7b62aae36e

    SHA256

    9614110dedb36006ad490df5f5ab55975d8c7ea20c24f4a6479b9da8a946e7f0

    SHA512

    ef95d56bd53bc3098985a279922657d66d08912bbfe1b5e5c7adb3c4d6267e79ecea28c15036ae023b3c1b052cca9e3111f9a868f7f4178f14db7eaa297e432d