Analysis
-
max time kernel
9s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
22-10-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
b42ba0044279182a62bd67a8626516ecc78eec394007707fba3ae3456584affd.apk
Resource
android-x86-arm-20240910-en
General
-
Target
b42ba0044279182a62bd67a8626516ecc78eec394007707fba3ae3456584affd.apk
-
Size
212KB
-
MD5
6ccab22764d1587a736fa868ae40fd4c
-
SHA1
0db5928e789f655cf3740975a53c96e77aaad63e
-
SHA256
b42ba0044279182a62bd67a8626516ecc78eec394007707fba3ae3456584affd
-
SHA512
c51ae78736cdae5e0ecd7522f311dc93239d3c1792002ef340c713624e81a2f1d54cd5059e5eb8657f2c30b62bbb00707f126cca9a59e312c700efc9ebc9b88b
-
SSDEEP
3072:fHiV//AapbWfPP5d7G3ASs7Dcgh9J3hH21Bvu4MiUDxML0vpN0GoY0UX5LcnV:fUnAaRKPniQpXc+9HW1puiU9MgPVC
Malware Config
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-5.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
gaxclze.xurdbnini.ttxsspioc Process /system/xbin/su gaxclze.xurdbnini.ttxssp /sbin/su gaxclze.xurdbnini.ttxssp /system/bin/su gaxclze.xurdbnini.ttxssp -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
gaxclze.xurdbnini.ttxsspioc pid Process /data/user/0/gaxclze.xurdbnini.ttxssp/app_picture/1.jpg 4352 gaxclze.xurdbnini.ttxssp /data/user/0/gaxclze.xurdbnini.ttxssp/app_picture/1.jpg 4352 gaxclze.xurdbnini.ttxssp /data/user/0/gaxclze.xurdbnini.ttxssp/files/b 4352 gaxclze.xurdbnini.ttxssp /data/user/0/gaxclze.xurdbnini.ttxssp/files/b 4352 gaxclze.xurdbnini.ttxssp -
Checks CPU information 2 TTPs 1 IoCs
Processes:
gaxclze.xurdbnini.ttxsspdescription ioc Process File opened for read /proc/cpuinfo gaxclze.xurdbnini.ttxssp
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5820cbf02ea27fd40918d9c659531266a
SHA1187b36b02ab4fcfb54905b030a2b60b0bd7fb215
SHA256551dc521cb094a8c6ed315d3f8d08581d036ca34187733edf8410f143f432f9f
SHA5120a24ca058a41ae4fb345ff7c29a45333ff0cf128ec8164f30214b680e7a4bcc0b8a197f5d40447df2bc55841c03bd6d2ce4f81638a4e60880c11a5c4831d1ce6
-
Filesize
446KB
MD55705e5b58e9503402cf66c15fbc1d854
SHA1ac943d94e87db55183a1cf24517c3d40361a2d03
SHA256c8e371d5021bc1f77ea2062c2a568ada090e464099596476536816b4feb1f5e8
SHA51246ed8f6f3a670ef3dbf0477353d3da5a19f3a188b51ee8cea492e3a6ffed77d14663eb1732bc084bdd78f4fea0a4190c39399a20aa2f6b6c92fc91bded97e70d