Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    02-10-2024 22:12

General

  • Target

    356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f.apk

  • Size

    278KB

  • MD5

    fba1aa4b732025b5de58f26be4f42fd1

  • SHA1

    aba2145d4468c499ad7efb9507ab0fc349370a9c

  • SHA256

    356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f

  • SHA512

    96beeece51b0611e694d5d073f5d5687e7868be16bb87206706c255e298f84a7b177f153a60db3dea7a452507290e13affce62a5a831ad4104d59cdd784bd5ac

  • SSDEEP

    6144:gV/tI/xyhBq3AFbm0JjZYutNbK5W0K8En0gImyCbYb8p:Vx4BqwBDJrtU5qrymyCo8p

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • eyvy.de.fmuh.sv
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4322

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/eyvy.de.fmuh.sv/files/b

    Filesize

    493KB

    MD5

    32ea07dc04894440546a54b3d8aec920

    SHA1

    ebe4b9674edc10f13f8b7475f3343d18384587b9

    SHA256

    dc83846877f91c30901cc0c8c204fb15e18c973efa0d4e401024313aedbc9a84

    SHA512

    604b2cc1c0e04b5c9152c020fc84780e9f37a8661d6e83b1027d8a8f42f1d3ce011583d1c7bafd97110978f3628f1ba6a698106051a93dde5f6a0a99d29eb2f7