Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    04-10-2024 22:03

General

  • Target

    dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.apk

  • Size

    278KB

  • MD5

    e98a480465dfe89e0c22d68142421432

  • SHA1

    2abf15e526b3f5610a06d1e3e73ce0bacf48442f

  • SHA256

    dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84

  • SHA512

    8bcebbd304fe51deb68d1214dd309ed9a841c3dcf0d2f8c96bfb4e4452a9044d4a0269eb821be35b07754e236d13cbea5f86c7dbb49b5afc8c5856ceb400c12f

  • SSDEEP

    6144:vZSF29iBhO2vzeHhxnVov5twa2CUE14juWjXXU9PorPHiEBXwlY:voFaI42vKHhxnWv5ua2Z9hXsPorRXwq

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Signatures

Processes

  • aeih.vwhppr.giqfgj.nynk
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4502

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/aeih.vwhppr.giqfgj.nynk/files/b

    Filesize

    493KB

    MD5

    0acec11e411091d5d2f40cd44f1ae37f

    SHA1

    5906b3f52fc62cafdfbd42ea1874c2c531f70f29

    SHA256

    79d4f514f638f528367e3473cee3d413b0f69377cf5b71483b171cf406dad899

    SHA512

    9d0623b709b98901f1d52e01a044c17d1c2949dbdbff4cc40e6a2301b48dabf22a26556e1c3924bb49b81c6fecda9d572c57bd27f61cbfe485c547218c4ec22f