Analysis
-
max time kernel
9s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
22-10-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
2907e51ccc15432f994455f61ddd90237fe3f000c796c5bd62c80f0a331220cc.apk
Resource
android-x86-arm-20240910-en
General
-
Target
2907e51ccc15432f994455f61ddd90237fe3f000c796c5bd62c80f0a331220cc.apk
-
Size
212KB
-
MD5
254467c96686879838ac2ea587c316fc
-
SHA1
ab0f412dc7f0748adb2c77adc3f658aecf7045c0
-
SHA256
2907e51ccc15432f994455f61ddd90237fe3f000c796c5bd62c80f0a331220cc
-
SHA512
6cee5f19e104460fa3fe8a4217998d2ee842516d8abb7276a2d9371587a81ea2642532b7d1f0ab3f6e222752d6e5d04228bb0af89575222db00db96170a74164
-
SSDEEP
6144:MyAnAaRKPniQpXc+9HW1puiU9MgPVKAQ9:MyjaRKPlpM2gDsK7
Malware Config
Extracted
xloader_apk
http://91.204.226.54:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su hcdpmuo.lkteczfer.nvvisk /system/xbin/su hcdpmuo.lkteczfer.nvvisk /sbin/su hcdpmuo.lkteczfer.nvvisk -
pid Process 4448 hcdpmuo.lkteczfer.nvvisk -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/hcdpmuo.lkteczfer.nvvisk/app_picture/1.jpg 4448 hcdpmuo.lkteczfer.nvvisk /data/user/0/hcdpmuo.lkteczfer.nvvisk/app_picture/1.jpg 4448 hcdpmuo.lkteczfer.nvvisk /data/user/0/hcdpmuo.lkteczfer.nvvisk/files/b 4448 hcdpmuo.lkteczfer.nvvisk /data/user/0/hcdpmuo.lkteczfer.nvvisk/files/b 4448 hcdpmuo.lkteczfer.nvvisk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts hcdpmuo.lkteczfer.nvvisk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ hcdpmuo.lkteczfer.nvvisk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock hcdpmuo.lkteczfer.nvvisk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground hcdpmuo.lkteczfer.nvvisk -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS hcdpmuo.lkteczfer.nvvisk -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver hcdpmuo.lkteczfer.nvvisk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal hcdpmuo.lkteczfer.nvvisk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo hcdpmuo.lkteczfer.nvvisk
Processes
-
hcdpmuo.lkteczfer.nvvisk1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4448
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5c5f011d1c8fbdfaf797cd128a3c8fbdf
SHA1a9839e9be3372c612b4d18d97d7e8c2976117312
SHA25639df754eb32dedf0167335589b3554b43d812794cbb92f488b72dcfa4cace5a2
SHA5121889885337ce4aa3d97315fdece2774f602596905ca993be93c11d3e9e6c62d909764d7a04bbfd4b3e302b3544e88b40a1ba07b2ad41522f123c78486f3481b7
-
Filesize
446KB
MD55705e5b58e9503402cf66c15fbc1d854
SHA1ac943d94e87db55183a1cf24517c3d40361a2d03
SHA256c8e371d5021bc1f77ea2062c2a568ada090e464099596476536816b4feb1f5e8
SHA51246ed8f6f3a670ef3dbf0477353d3da5a19f3a188b51ee8cea492e3a6ffed77d14663eb1732bc084bdd78f4fea0a4190c39399a20aa2f6b6c92fc91bded97e70d
-
Filesize
8KB
MD5b6ed1ea916ff4b90e4f9db9bb09c2d0e
SHA119481dc25d799968126d5658efa27a210470a0c3
SHA256b213f2ebcc68c20ba3835edda37508e8ea06bf78bc6c622238651279931e0351
SHA51274a90354166b25db5d87b0d65a22cbc64501b81f5a52b44abbc5ccf5d45fb98f2d1f9cb82a3b831adb05a967a63ea68a60e1abb817061aefec5ae2b43cfc416f
-
Filesize
36B
MD59016fbd22b58af5d4435f935ce2981d3
SHA157abf6625992111658486675ba4f44f55d319cd4
SHA2561c2c6e10c58fda293d3d272cbd28b7517ba1f2f6210f17ed7c8fefd9d968a35c
SHA512ffa6fd77b20dd13fa2f0caee9a7e75c6cb5d3f44e1a1bc3621a38236cc7cda34dfd05eab6d9391bea756ee0d4328ea397c99eee0bd94d29257d85a461e8f5062