Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    10-10-2024 22:07

General

  • Target

    0857b7925c0ab09779ea5bccdf400add91f755b65333a0baef8a6d060149c5e4.apk

  • Size

    307KB

  • MD5

    22d3566c70d744455e0bc0d6b35b9700

  • SHA1

    9e7eb5ac7d50e5c40d53270ad008e4a973d03d25

  • SHA256

    0857b7925c0ab09779ea5bccdf400add91f755b65333a0baef8a6d060149c5e4

  • SHA512

    41d9e6af47f4b5cc478223778e8cba72733c8948836686bd5ea7c16a6601aa34d95e5089d674c2398c3913706fd7b3f4f423c859d5da559542505e1ad16edbb9

  • SSDEEP

    6144:mxxcsbwqBzVFEuELPmrCyiyJ+tyqK02zGVmxJifqk1bdSu1NNg93IFFNz:mXPHEL+iyJcNz2zGVmxJ2xbdzNNg93Mz

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • iblu.zg.ws
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests changing the default SMS application.
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4217

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/iblu.zg.ws/files/dex

    Filesize

    580KB

    MD5

    ed9219be2761d62f01f05dee71f02df3

    SHA1

    c2b904961f519a66052c04d444b34ef4c3f00e67

    SHA256

    b8f6a3769331039a5f2dc29eba3adc431a7b086d47ec579cd143da11f137f13d

    SHA512

    420dc0fa4e231a66fa5c26fbd7952f574aa24aec62ecdf387dd376e98dac93cbea493785d67a030bd6d6745b00c7f3b14b693f906124ee6438b6a227d682f8bd

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    b7b7af51aace7d8bd41d8f7066d4009d

    SHA1

    bd8afa517a391f047cfa6aa74cfd3a127a749010

    SHA256

    9f03436dc48930e71fe1eb399e623d6134c9418e0f657209502a67be373356a2

    SHA512

    3bf9e45d76174ff7802284403d8745f775cc867ab3bbe5ce5299e213d3632dcf6bf9a29569e358af0bd9542b84cab2600b7e144e2e4aad32638d1741bd109baa