Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    02-10-2024 22:12

General

  • Target

    cc1a40d19711f8f11ba3adbbf734bb088f29a2d9f9097a4e7e9bed0c71c64470.apk

  • Size

    278KB

  • MD5

    fd3966b21ed34d2374cafcfeed38f43d

  • SHA1

    a688e7026e0baa9c152d058a25c832d4f4b9cf50

  • SHA256

    cc1a40d19711f8f11ba3adbbf734bb088f29a2d9f9097a4e7e9bed0c71c64470

  • SHA512

    5e2924cb2c74e8b81a8d51fb8040afaa461b574e0bff0ab37ebac7d2dc84041cc84e45b1227de85838759e5ebb1b3ad9f6cd7efd06be804a4ddba8aadd2d1d7e

  • SSDEEP

    6144:a/tI/xyhBq3AMDEXqCrw7jZYutNbK5W0K8En0gImyCbYb85:Xx4BqwMDEfrYrtU5qrymyCo85

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • ozrajt.pqp.ua.auyolu
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4349

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ozrajt.pqp.ua.auyolu/files/b

    Filesize

    493KB

    MD5

    32ea07dc04894440546a54b3d8aec920

    SHA1

    ebe4b9674edc10f13f8b7475f3343d18384587b9

    SHA256

    dc83846877f91c30901cc0c8c204fb15e18c973efa0d4e401024313aedbc9a84

    SHA512

    604b2cc1c0e04b5c9152c020fc84780e9f37a8661d6e83b1027d8a8f42f1d3ce011583d1c7bafd97110978f3628f1ba6a698106051a93dde5f6a0a99d29eb2f7