Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    09-10-2024 19:15

General

  • Target

    QYADZO.apk

  • Size

    40.1MB

  • MD5

    c57e877b317a6ae1c731fc398eae134a

  • SHA1

    19615fcb1d0cfcc30c114c4f69a62082b5615857

  • SHA256

    845df5afe3977d1d0109d725cf63b0c21e23f870ccf2de613f66f96e8ea145bd

  • SHA512

    6bd7d975a9a2ec29c6b0ebeb2117f922e5173775e6a3541baa1d9abf8901b8a46e53a8fa04b1b9aa6e51408a7716bc0228ec58268653a5290ec569121d637e5c

  • SSDEEP

    786432:H38Ym2d67A9Ls3unQn1SxlMTpxABB9F5d3fHQ62G3Zu3V0u/U1S2h:ITn1SvMNxABB9vdx3ZgygUhh

Malware Config

Signatures

  • 888RAT

    888RAT is an Android remote administration tool.

  • Android Xamalicious payload 1 IoCs
  • Xamalicious

    Xamalicious is an Android backdoor malware implemented with Xamarin framework first seen in December 2023.

  • Acquires the wake lock 1 IoCs
  • Checks the application is allowed to request package installs through the package installer 1 TTPs 1 IoCs

    Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Requests allowing to install additional applications from unknown sources. 1 TTPs 1 IoCs
  • Requests dangerous framework permissions 4 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Tries to add a device administrator. 2 TTPs 1 IoCs

Processes

  • com.example.dat.a8andoserverx
    1⤵
    • Acquires the wake lock
    • Checks the application is allowed to request package installs through the package installer
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests allowing to install additional applications from unknown sources.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Requests enabling of the accessibility settings.
    • Tries to add a device administrator.
    PID:4351

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/.app.apk

    Filesize

    38.1MB

    MD5

    147e6b26aa1f252bf912c7a1c3a01cb6

    SHA1

    2cf8e0ccb43311f5885d95bc0188462077a9f77d

    SHA256

    af6985992d674ac664c07a659515de10eae7ecade0183fda28ac46bb83bcc425

    SHA512

    89a72e52c0b739bdde18c80aef5ab162cad73f88a077429d3aff34c7d84ae7206949d5145acede4ff3359d324323fece006230a70064380e1878b3020172e89b