Analysis
-
max time kernel
11s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
24-10-2024 22:10
Static task
static1
Behavioral task
behavioral1
Sample
2fd99852874c1f595bf3e04fa934694df9523ef0cf7d915442aa002841c08dad.apk
Resource
android-x86-arm-20240624-en
General
-
Target
2fd99852874c1f595bf3e04fa934694df9523ef0cf7d915442aa002841c08dad.apk
-
Size
212KB
-
MD5
1166056c59adf67029d1c8badad93a9c
-
SHA1
e0f60f096445ae54eebd343bfedaf6e5c29d32c0
-
SHA256
2fd99852874c1f595bf3e04fa934694df9523ef0cf7d915442aa002841c08dad
-
SHA512
9fabf6f06a0e651142c84b14aeff713c6b8c18d346d323ef738b46973496ab35f930fbcee8b7504ce6049ec6249621a172fa531cd365324cc8382de6adaf9d89
-
SSDEEP
3072:O9BV//AapbWfPP5d7G3ASs7Dcgh9J3hH21Bvu4MiUDxML0vpN0GoY0UXXLcnEd:ORnAaRKPniQpXc+9HW1puiU9MgPVZd
Malware Config
Extracted
xloader_apk
http://91.204.226.54:28899
Signatures
-
XLoader payload 1 IoCs
Processes:
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheadioc Process /sbin/su cpxlrmf.jmrbcnfob.cyhead /system/bin/su cpxlrmf.jmrbcnfob.cyhead /system/xbin/su cpxlrmf.jmrbcnfob.cyhead -
Processes:
cpxlrmf.jmrbcnfob.cyheadpid Process 4261 cpxlrmf.jmrbcnfob.cyhead -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
cpxlrmf.jmrbcnfob.cyheadioc pid Process /data/user/0/cpxlrmf.jmrbcnfob.cyhead/app_picture/1.jpg 4261 cpxlrmf.jmrbcnfob.cyhead /data/user/0/cpxlrmf.jmrbcnfob.cyhead/app_picture/1.jpg 4261 cpxlrmf.jmrbcnfob.cyhead /data/user/0/cpxlrmf.jmrbcnfob.cyhead/files/b 4261 cpxlrmf.jmrbcnfob.cyhead /data/user/0/cpxlrmf.jmrbcnfob.cyhead/files/b 4261 cpxlrmf.jmrbcnfob.cyhead -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Framework service call android.accounts.IAccountManager.getAccounts cpxlrmf.jmrbcnfob.cyhead -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process URI accessed for read content://mms/ cpxlrmf.jmrbcnfob.cyhead -
Acquires the wake lock 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock cpxlrmf.jmrbcnfob.cyhead -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground cpxlrmf.jmrbcnfob.cyhead -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS cpxlrmf.jmrbcnfob.cyhead -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Framework service call android.app.IActivityManager.registerReceiver cpxlrmf.jmrbcnfob.cyhead -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process Framework API call javax.crypto.Cipher.doFinal cpxlrmf.jmrbcnfob.cyhead -
Checks CPU information 2 TTPs 1 IoCs
Processes:
cpxlrmf.jmrbcnfob.cyheaddescription ioc Process File opened for read /proc/cpuinfo cpxlrmf.jmrbcnfob.cyhead
Processes
-
cpxlrmf.jmrbcnfob.cyhead1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4261
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD501412d167c7429f0ce414db98ca8734c
SHA17916e67e99478e81f8d8a6ccca3bb5a101e0a2d7
SHA256deb702fb1397e50a930aabd0694c4f290cd5bef35be4efdbfbf9d122e3b09209
SHA51241504fc414d0c38ab9ee580d0fe724a67b705fb1ac34ce9f6408ab09d4e8c8242cad604ca2733ec87e44c24904fdfad5f3f33ce60f5877acdee5dc7914f49bc9
-
Filesize
446KB
MD55705e5b58e9503402cf66c15fbc1d854
SHA1ac943d94e87db55183a1cf24517c3d40361a2d03
SHA256c8e371d5021bc1f77ea2062c2a568ada090e464099596476536816b4feb1f5e8
SHA51246ed8f6f3a670ef3dbf0477353d3da5a19f3a188b51ee8cea492e3a6ffed77d14663eb1732bc084bdd78f4fea0a4190c39399a20aa2f6b6c92fc91bded97e70d
-
Filesize
8KB
MD508021e7a2016a920bd365c036570b9f4
SHA1ecebf7d07724248e92fe0547ee06e02c6e2e6b94
SHA2567cebd9e1865aca35c9fbfe5d2eb53a0866ea1bc162dfc8a71cc015ab3413bf29
SHA51244bdddaeba3eba672c83c5dc2670c639d2afd711defceab84c532c6deb7dcc06307daa829acd4ef83fd2d562a66bd4958dbae48e427d6dbb27798d95953050a9
-
Filesize
36B
MD52665d0d93824eadbba7d2b241f9e17a3
SHA16f9042197dc6dd181e0c596d9a3e9a2ee999cd02
SHA256659b7204a01dda799d4b2ea65c5bc9077e6bc8088fb9d7ebcb0d998261c79cf7
SHA512c8f98992e8d28283312bcb324b8f47f16812adabd111fec09ad85d101212a2e10369d3681bb1db14e50d6ab1613eccd950fc9860548353b615687e5ea625ce18