Analysis
-
max time kernel
149s -
max time network
132s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
02-10-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
cc1a40d19711f8f11ba3adbbf734bb088f29a2d9f9097a4e7e9bed0c71c64470.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
cc1a40d19711f8f11ba3adbbf734bb088f29a2d9f9097a4e7e9bed0c71c64470.apk
-
Size
278KB
-
MD5
fd3966b21ed34d2374cafcfeed38f43d
-
SHA1
a688e7026e0baa9c152d058a25c832d4f4b9cf50
-
SHA256
cc1a40d19711f8f11ba3adbbf734bb088f29a2d9f9097a4e7e9bed0c71c64470
-
SHA512
5e2924cb2c74e8b81a8d51fb8040afaa461b574e0bff0ab37ebac7d2dc84041cc84e45b1227de85838759e5ebb1b3ad9f6cd7efd06be804a4ddba8aadd2d1d7e
-
SSDEEP
6144:a/tI/xyhBq3AMDEXqCrw7jZYutNbK5W0K8En0gImyCbYb85:Xx4BqwMDEfrYrtU5qrymyCo85
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/memory/4349-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/bin/su ozrajt.pqp.ua.auyolu -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/ozrajt.pqp.ua.auyolu/files/b 4349 ozrajt.pqp.ua.auyolu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ ozrajt.pqp.ua.auyolu -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ozrajt.pqp.ua.auyolu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground ozrajt.pqp.ua.auyolu -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS ozrajt.pqp.ua.auyolu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal ozrajt.pqp.ua.auyolu
Processes
-
ozrajt.pqp.ua.auyolu1⤵
- Checks if the Android device is rooted.
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4349
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
493KB
MD532ea07dc04894440546a54b3d8aec920
SHA1ebe4b9674edc10f13f8b7475f3343d18384587b9
SHA256dc83846877f91c30901cc0c8c204fb15e18c973efa0d4e401024313aedbc9a84
SHA512604b2cc1c0e04b5c9152c020fc84780e9f37a8661d6e83b1027d8a8f42f1d3ce011583d1c7bafd97110978f3628f1ba6a698106051a93dde5f6a0a99d29eb2f7