Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    19-09-2024 22:17

General

  • Target

    e7101986211a5b41c4193bb4b6f91a1a2b9ad071b24e1ae8dd09d717ee98c933.apk

  • Size

    291KB

  • MD5

    8b10ccda804ce676740e84d5af52feee

  • SHA1

    8609bd6a76fe0f1208af5d87cf56916db25805d3

  • SHA256

    e7101986211a5b41c4193bb4b6f91a1a2b9ad071b24e1ae8dd09d717ee98c933

  • SHA512

    c2dcfcf6b30dc2ab8775a972d9349f1391aac0a81d4e7561adf3605a003d3f07d822af92a9e7e5b814b2f201f850f1e2905c8f8fec6a13b9f5d098f093e30da9

  • SSDEEP

    6144:e2GM3RzJmjr6jiSRWrKaYQzMps0/HsHAPJ+Pcu5kn/CwWBCowQpN:NgX6GS2YsMoHu+Eqw6x

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • com.xzkl.arwf
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4620

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.xzkl.arwf/files/dex

    Filesize

    483KB

    MD5

    e12d777273c3f474433d79bc6f46513c

    SHA1

    ded0831d8bda2885bb178161575a3edb4c358549

    SHA256

    bc13812bbf18e78aa81d1e49fd2b62864069620846c56e94d70dbe0c6d64d7f4

    SHA512

    e09b08a56793a36f0ccc40db82f05f0ff8597597cc1b1afd0b1fbdc472a8cfbaae9e40a205f4b85a7652b045a442b0822e808e224d603fdab5e2e5a23141297b