Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    22-10-2024 22:11

General

  • Target

    db38af5228d5b81300343d1cf9eed7ff65c488b21454d5fa9df989c27be1b4ba.apk

  • Size

    205KB

  • MD5

    3f54fe5daf08a1026e50e59d417d4f31

  • SHA1

    3ddd382226110d15ee7f90e597fa19ee73e0b1c3

  • SHA256

    db38af5228d5b81300343d1cf9eed7ff65c488b21454d5fa9df989c27be1b4ba

  • SHA512

    ab64a38a5fd2e6fe05f2e570dcb6716ce26eaeeec986782685892e3e187308690c7852c47566a0854e8fe4d07ef6b809d888731e3065ca55dce4d937006be708

  • SSDEEP

    6144:FP4x2Y8Dqsz3PlMHKLATFhjHCORXelZGUXx++oPnOvC7:FPA2YLKf+MCb1efBk+VvC7

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • jtiq.fknpp.ektiz
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4788

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/jtiq.fknpp.ektiz/files/dex

    Filesize

    454KB

    MD5

    c908b637c002940ef72c0f34eda33115

    SHA1

    c886b4786f696ca4be26516a83e842863e71f728

    SHA256

    125b57669edb6060fea0e71718ea17c957186496c2c1ea010d95c64218fe31ae

    SHA512

    57eafa70138d9b97af7c3160306133f1591f015563f4ebe21cb4a0354a6c2a380e246de64ea54d492e84d433b77b50d887ebdd3566002799abdeba66742ec350

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    da014ab7873f5939b645447fa7c8c7a1

    SHA1

    bbc285f55a5e54980804a953361386795bd22868

    SHA256

    27c4265a5966bdbf0508f0e39f9cc66947772bb7d3628ba0acc2eece7a537feb

    SHA512

    37b8fc99c359e952416e22b1fe0eb42f8ff657657459649daad996863722805b4b5771bd43e7a70ed4c55e4cd8b5b2b0bbb8e93c8699770ccdabc441570ff8b0