Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    23-10-2024 22:06

General

  • Target

    f4722d62a3da6e1e57fba41eac7b1fea760beea6cdf1c2e59147cf1f18f24f21.apk

  • Size

    308KB

  • MD5

    e972c160ca31611fe6ffbe33d6af99e3

  • SHA1

    6c514467f3793e6a1f79deda7cd5e53d3d17f2b8

  • SHA256

    f4722d62a3da6e1e57fba41eac7b1fea760beea6cdf1c2e59147cf1f18f24f21

  • SHA512

    5acc007f2c0b9b9d9617cf4f5a64dd21596f027134124e05356974683c578a4531ce592d887dda9b8ecf861f19dc00717b95eab1d9a9647b62bc20d2c41984f5

  • SSDEEP

    6144:+NpYjw1m4GQeREr7tIDj914cmLb9MKkqWMqAPhfRbZ45J7obwgjIOzYuV:oqh4GxwKDj34cu/xk5g5jRzFV

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • com.jydj.zhpr
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4222

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.jydj.zhpr/files/dex

    Filesize

    580KB

    MD5

    c536443ee1087197f98f357bb4b580b8

    SHA1

    7e3acd75cfda81d1496e3b0ccdca6c8c6e3bc931

    SHA256

    e3309f70ef221883f41b77c97c76945438e8bf79e5d3f4b8d650be53c467a3c5

    SHA512

    7a8f23a89778677d3470641f74cb5293a0a69954a07ac8383ebe720ddce4bbca24e63b0d1f69007bab94cded6c2b02a14a7dece1e5d57eaa58d41133c2652e69

  • /data/data/com.jydj.zhpr/files/oat/dex.cur.prof

    Filesize

    1KB

    MD5

    9a97987d9738a4d1610c40c33f0f0020

    SHA1

    1d8faa244b572f0d5b4d5e12fdb1154b83b9fed3

    SHA256

    95e99c7f98ca62e643945a57c3a586af49547a40cca3e25388d753dc361ded29

    SHA512

    99119f7dd900281dcecc759d8f4314b8dda60bf38ff1b52d5808cd8292b22d6e50fc159d1eff878c0ffa94f1d9d6d657cb9808381b3b1001215c81dc6c7f019d

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    ddc7f6642aac57e8745983b8d95084b4

    SHA1

    4b2c38f9418914efbd208577365f6f2ca4c276ee

    SHA256

    c0070977d410b400e6c3c4bc49d0a9cdb41762606a5317a9963a3cc3f3a54bc7

    SHA512

    f23f1d7b52ca62b4d641b0bc8a9e5db4becf910e9082f8f82eefda95f97e0356659d4c2b2f4410ba4a8475d3b5d8c1d14bab963c9e49a978694c739d81c1bc52