Analysis
-
max time kernel
10s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27-09-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
ae33bad102abc294bea3a6c5e7ce652013b56126b70f6514904131132f17ca2f.apk
Resource
android-x86-arm-20240910-en
General
-
Target
ae33bad102abc294bea3a6c5e7ce652013b56126b70f6514904131132f17ca2f.apk
-
Size
412KB
-
MD5
9c3174ec0721c772f758e7c5e91c9d8d
-
SHA1
a4174cee7df735a6125fe6b1b5c9d7918b172743
-
SHA256
ae33bad102abc294bea3a6c5e7ce652013b56126b70f6514904131132f17ca2f
-
SHA512
4efd87fb4dc0dbff31c9abcf4e4e9616f6e1f8e0bab1b52c7a2ec3a17f0f21c10dfb7d7cb27f6718f89dbd09d80bf657579a42c3576cd2f5cd6b14f986b4686b
-
SSDEEP
12288:RUkuBN9ufUI+cgy2fpvMnmHXQ6b/fX/rVahj:upzrIwHRzHX3b/fPrVa9
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbioc Process /system/bin/su xiznhrl.negpguzxu.wojzvb /system/xbin/su xiznhrl.negpguzxu.wojzvb /sbin/su xiznhrl.negpguzxu.wojzvb -
Processes:
xiznhrl.negpguzxu.wojzvbpid Process 4315 xiznhrl.negpguzxu.wojzvb -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
xiznhrl.negpguzxu.wojzvbioc pid Process /data/user/0/xiznhrl.negpguzxu.wojzvb/app_picture/1.jpg 4315 xiznhrl.negpguzxu.wojzvb /data/user/0/xiznhrl.negpguzxu.wojzvb/app_picture/1.jpg 4315 xiznhrl.negpguzxu.wojzvb /data/user/0/xiznhrl.negpguzxu.wojzvb/files/b 4315 xiznhrl.negpguzxu.wojzvb /data/user/0/xiznhrl.negpguzxu.wojzvb/files/b 4315 xiznhrl.negpguzxu.wojzvb -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process URI accessed for read content://mms/ xiznhrl.negpguzxu.wojzvb -
Acquires the wake lock 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock xiznhrl.negpguzxu.wojzvb -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground xiznhrl.negpguzxu.wojzvb -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS xiznhrl.negpguzxu.wojzvb -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver xiznhrl.negpguzxu.wojzvb -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process Framework API call javax.crypto.Cipher.doFinal xiznhrl.negpguzxu.wojzvb -
Checks CPU information 2 TTPs 1 IoCs
Processes:
xiznhrl.negpguzxu.wojzvbdescription ioc Process File opened for read /proc/cpuinfo xiznhrl.negpguzxu.wojzvb
Processes
-
xiznhrl.negpguzxu.wojzvb1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4315
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5fc9f5b344ef54be998e33dc49e5d7fe6
SHA1ea4e5b3efd5d0006da4987856b97a83f21533f7b
SHA256106fa3d8b3e157b23c785ba62aac66e70fd29dd2640c76909a30d7f190d168fa
SHA512305c75243e44b6141adc484e1f78c1933a707a1b7d512a8ae0d469ff66833cf4a172b6ef3d807618614f9f20a2deda40df126cee7db113ae5b120647bfee44ce
-
Filesize
446KB
MD54f4569db9ddb90b5f60c424621cf3a72
SHA163c79e63187921b33d30c66de3e791e3f51d746e
SHA25618c14954e985db1a807189513a739c2ccb9ad37bba6cc9f8a61f0c42edffda4c
SHA512cf1c150f19ccc58441ac38060fe80961bbc9ea575a69c4437bd04be7555b92a3422490a4358f720450492edf5780d3d76eed4e02493c184bb3f13a8ab5ec4929
-
Filesize
168KB
MD59a373eab7e5da6c87ca65c436f079f13
SHA1b06fae4776edc00a9d4c3bc72c3326b69cde06be
SHA256e99223b67cb68d47729f2259bebd7b845a1bf28432b97809a89fa40a80453686
SHA512f661d474cc7889b74689b5bb004e2a06b77fdfe7fdbe2db106a86da2894bed37613aa3db9422478429c483e8250f28f640d2c5f7b785211ebaa5ab09ea7fdab3