Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    15-10-2024 22:08

General

  • Target

    3813e4ca478074609654fac38211cf6baaa24bbb355e0d19acdb2270602e2d97.apk

  • Size

    302KB

  • MD5

    012a279310f1924c4552a2a3afc80dfe

  • SHA1

    cbc21a308e564623046c5f8fb3e07ecdd84c3d94

  • SHA256

    3813e4ca478074609654fac38211cf6baaa24bbb355e0d19acdb2270602e2d97

  • SHA512

    caf47199e5a9342461e95a59ed14a6e3400c6eb5c01d4299b10c1ec8363b12415e397fc4dd92201296302d09085158048db0c98110dda8f1a4be5463577a3d02

  • SSDEEP

    6144:PCp7EybYVdzsiH3d7B+tRyW4DxjJDHNJwj6QPX3z2p9ToCBTzk:w7EybqdzsiBBS50ZRtJwjJP3Ixc

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • fctv.hxaej.snqkz
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4560

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/fctv.hxaej.snqkz/files/dex

    Filesize

    580KB

    MD5

    8c7542abcfd5e2c08e99555d8d0bc605

    SHA1

    5f40007a5343603be18a1ce3c39ce43604099be5

    SHA256

    0cd2b17aa21cd8de63842da21e3464df7bb2bd4a278fffbbfea6b294c3ca9e6d

    SHA512

    362c7dd23aa52a9c72e9d90eebb99e1d4e4cd01b68348249bbeee4bb407728aabd30874488926635bacb2e1d640ad4e95852e345afa8ad66057c80c8f768ed88

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    f7cac7524dce0ae9a83564ba4530e3f6

    SHA1

    bd3046af9f25fd837f45c1829b6c16bddb15b64c

    SHA256

    366f9c7cbdd1f947acb145809d1fab90cda65a66a89d1d24fd4ce9722f9a5920

    SHA512

    ebacc9283edf8afc6f44cc73b6824cfc543ebf3c296c8162c51148a276fd90293f3a87dcc05a921e411108fbeace16a2290c40d22f1c570389bdd6655136938a