Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-10-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.apk
-
Size
278KB
-
MD5
e98a480465dfe89e0c22d68142421432
-
SHA1
2abf15e526b3f5610a06d1e3e73ce0bacf48442f
-
SHA256
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84
-
SHA512
8bcebbd304fe51deb68d1214dd309ed9a841c3dcf0d2f8c96bfb4e4452a9044d4a0269eb821be35b07754e236d13cbea5f86c7dbb49b5afc8c5856ceb400c12f
-
SSDEEP
6144:vZSF29iBhO2vzeHhxnVov5twa2CUE14juWjXXU9PorPHiEBXwlY:voFaI42vKHhxnWv5ua2Z9hXsPorRXwq
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/memory/4502-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/bin/su aeih.vwhppr.giqfgj.nynk -
pid Process 4502 aeih.vwhppr.giqfgj.nynk -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/aeih.vwhppr.giqfgj.nynk/files/b 4502 aeih.vwhppr.giqfgj.nynk /data/user/0/aeih.vwhppr.giqfgj.nynk/files/b 4502 aeih.vwhppr.giqfgj.nynk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ aeih.vwhppr.giqfgj.nynk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock aeih.vwhppr.giqfgj.nynk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground aeih.vwhppr.giqfgj.nynk -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS aeih.vwhppr.giqfgj.nynk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal aeih.vwhppr.giqfgj.nynk
Processes
-
aeih.vwhppr.giqfgj.nynk1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Uses Crypto APIs (Might try to encrypt user data)
PID:4502
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
493KB
MD50acec11e411091d5d2f40cd44f1ae37f
SHA15906b3f52fc62cafdfbd42ea1874c2c531f70f29
SHA25679d4f514f638f528367e3473cee3d413b0f69377cf5b71483b171cf406dad899
SHA5129d0623b709b98901f1d52e01a044c17d1c2949dbdbff4cc40e6a2301b48dabf22a26556e1c3924bb49b81c6fecda9d572c57bd27f61cbfe485c547218c4ec22f