Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    22-10-2024 22:11

General

  • Target

    6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1.apk

  • Size

    278KB

  • MD5

    769340c0fcb9bad35a0916636286f776

  • SHA1

    b812f5aaff6843bbf9ae091bf0fb6e9cd4b40fed

  • SHA256

    6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1

  • SHA512

    6306af45ea8eedea1f648410212adf17c5935e6456914856ac04a6b301714b7c5aeee0dbbeb26962ea61dda2a6e77db412f126cebecfd1c02bb902d7dcdac713

  • SSDEEP

    6144:ldQvSjB6WhOxaP3qXHsbdA1Vj2WqW5TKpC6y6DSent7gtpS85N5+4+:lmvSjJqbXHwATjJY4yDp7g7SQ8F

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • ke.sod.zp.kwlip
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4476

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ke.sod.zp.kwlip/files/b

    Filesize

    492KB

    MD5

    7e1b639338295aaf9149d4d5cc496ed6

    SHA1

    d89b93d56bf924551e6b421234179fd4fec859f9

    SHA256

    02fcb596708bde924cdf258495deeb6cdb5a8016d01eff81f1b3ae449c2465fa

    SHA512

    699ae0b027bce12865a1db5890ab38f79b22fa4b64e4739316e50e0f73e0c399ab2d4a2bc939b66b53796b821326e66822ef9102c3bce9b8e3854cabb1fa356f

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    8df20ddea122b44f0382257baea5286d

    SHA1

    ac6dee766e71b8bc8739910e1cf081d633730f56

    SHA256

    b5d9581d97b17a17e4e05a08eab3c31d6d021e5fa6735ca2c62ff0ef83cc819d

    SHA512

    6ec0c5129aaf0d4c19790543a45fe77931c8a5eb5d411389e4827df6a14ddb8f79b04f7bc6ae50fa8b5839b1b5a08476eff00e74d2f535cbd3fa691c759e44d3