Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    17-09-2024 22:05

General

  • Target

    47fa634279445320ff247d2d9a3806d6161e3a588a6272f17d875a7f57fe10ed.apk

  • Size

    277KB

  • MD5

    96245445773b9245eb78c2968a1340f2

  • SHA1

    4eedf5d07daa9390bae40dc389a67f88376d5307

  • SHA256

    47fa634279445320ff247d2d9a3806d6161e3a588a6272f17d875a7f57fe10ed

  • SHA512

    9b6eb246ef78ad37aeea7f800a5159c1a143f750a0089d15e2e720210da5f42aafd3da386be4bdf004f924e5124906d8651b6f28d0c966a4d6e7c4b8940e5839

  • SSDEEP

    6144:7qoJGeH7Zv8PyA5toP/R91TNOX7p/DN2Qz1QZBBUn0HNMcCHw5rRA:7qojb18PZtgPvu1Dnz2Lqn2M9w59A

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.pkyo.lbjb
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:5058

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.pkyo.lbjb/files/dex

    Filesize

    484KB

    MD5

    70f95d8cbe97d5c2eba3ea8444ae66ab

    SHA1

    ceeb757ec23da7c6b127262ae1dd966b4a7a73cc

    SHA256

    b02e06dfd1642646e5ccf3a06ccfc850edd1ba0464550962a15e69a0b6931426

    SHA512

    666d43b00bb424631c17248ced477990e5d2375b9ca086aeaf976ec00c44d017ff8e72538afdaa26b918014451382c8462a84c37ad2a597e0ec1c39288c96efa

  • /data/data/com.pkyo.lbjb/files/oat/dex.cur.prof

    Filesize

    902B

    MD5

    38a2e0540e5b60cc79364a3cb781af50

    SHA1

    06a72e67bacc1210e2e02efd9f880557f2c40152

    SHA256

    dc7f04107cc6b1d4591b9d5b84e167a0b8aff9ef23fe4d12450ada33245eaab1

    SHA512

    3cf533fb2c47a6be7de0ccfdbeee048fba0f173be1d61ecaefd569c4eba29234aa6e6a04de5922ac4bbad2f9d1b7d03397fcc61f308bc0802f071c9128a3a9b8