Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    02-11-2024 22:05

General

  • Target

    bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16.apk

  • Size

    282KB

  • MD5

    da2e2bc204da710420d4c8616cb2086b

  • SHA1

    b69834bb3c54c0993efcca01d52c080ca103e531

  • SHA256

    bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16

  • SHA512

    aa8381928e347a7402531f1b7b9b58ca0255beeaf2f248ed3511929eda978f1efd582f34fe28489a21086c370d7adade413bbf42a3c4d602ed07528ce8cac357

  • SSDEEP

    6144:AtNor/7huAoogmp6uIZkpBcxqjpDYypUt2YM7o5jnqoPZP:4NQSogO6H0xYkcmoscP

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Signatures

Processes

  • frgox.bnu.ard.zh
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4514

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/frgox.bnu.ard.zh/files/b

    Filesize

    505KB

    MD5

    1948f47b3ea40b56b95c2afea1715414

    SHA1

    5c690f45283971be674c6d8a2e54175b0ecf55eb

    SHA256

    55e4054d9045b3a34d808883c387d64cbae6a402ba7551f1c7a19d6b2bcc5ae7

    SHA512

    8f3e40ff08f864901147cd60dd88191b9f792a746f0d923e3fea3a30f1ce951ec984013641b32ce1130b764f3d27974ac1a4a9d281090c8bbbff02808ffeb436

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    0b4c020122693ca19f20f072d5e0d060

    SHA1

    be9e221b9682ff4136f96db808b6faabfc0c76aa

    SHA256

    75228cfc68c74f1517655018b91b8ee8abb3fdb9c0a762ea5e6e21ad2db01a56

    SHA512

    3525e5eec77440f7471cdf0618770e1743032c241c11d297653fc68fef275e949f290aae0fd01fd71c03e3b56a1f6ecdb592beb0941ccaff1e929584231744f4