Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    10-11-2024 22:06

General

  • Target

    692485ce9b6b8ae4d878c650d8b40f547cc13b4f2b7a875a7f46422744e2019e.apk

  • Size

    212KB

  • MD5

    27428d3a0058f9696ad4b95dec2d99b7

  • SHA1

    8b9b2aec4dc16d3fe38b6832db3a0526cdd581bd

  • SHA256

    692485ce9b6b8ae4d878c650d8b40f547cc13b4f2b7a875a7f46422744e2019e

  • SHA512

    8cb1bdf858b7b3a41f9f4f0825fb3331fecd2f7ac4fbc91ebc8bbb467cb382c3ede164fa0c2a098394808b8a2fc58d5c39d38da3cacbe394ac11f1182a84d3d2

  • SSDEEP

    3072:5hqtLTRvDLCeI1xuwu9KJTIRIJvSYZETVmddVIoRpwGw0fvsIMqJgcE5ontAw1tk:5hqrDL+uwWIIRIJv/Eslpw/0eqph1tzQ

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Xloader_apk family
  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 5 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4255
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/app_picture/1.jpg --output-vdex-fd=46 --oat-fd=47 --oat-location=/data/user/0/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/app_picture/oat/x86/1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4281

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/app_picture/1.jpg

    Filesize

    7KB

    MD5

    85c11f37525413949a054630600c7e86

    SHA1

    63173fa70e4a9be981990d52d022a5a29c5ed88a

    SHA256

    72307c9cfec66fc806164031b7c3bd2a12b0f6ababbd861857ebf351f919da58

    SHA512

    66fa7d2b971e4097a624dbac9d365bf4aa73ca4d7f03c4af70433546f64b328d7673cd22dcffffb1a06849e88b20b3b38f9b4bf6c9a87068bb9604804cd2be40

  • /data/data/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/files/b

    Filesize

    446KB

    MD5

    a08eb40c8f41932cdfbb171b11047499

    SHA1

    640df821c78b575ddc1fb1ba3150795ae8a38af2

    SHA256

    21de04b706537eb676cda25497d25ce84e45d132232f715656f81c1e66ea4767

    SHA512

    03512be8115948dadefab3d4490e82fe8ebf5baa79765ecb63aec0b1ffa97c29ab37d68abf628e35ecb186ac1e81b2f259d392891eef2633707288803921442c

  • /data/data/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/files/oat/b.cur.prof

    Filesize

    1KB

    MD5

    7728773b14b783d0f6c80bf01fd2780d

    SHA1

    356d672af594ea9028663671464f6a0bd09ff774

    SHA256

    09b3f6209f6db9da72874f6c88b075bc08b100c33a3eafdddb0e92175717e89d

    SHA512

    aa0c96840411422b480ab15ebe5c64eca50268226448d128fa56c34d6b483dbcef9a9e09929cc99d474e4d890cea9e5647fce381a9c1c1219a3d5532965bd4fd

  • /data/user/0/yailecf.wyuezplvb.buaidw.vwzqzfpw.ihtse.ayfjg/app_picture/1.jpg

    Filesize

    7KB

    MD5

    afc5ec8d6daef73722d2041cd1d6f135

    SHA1

    b17e18ea80b0c27d265b8de2cecb722055dc1108

    SHA256

    a00e2c17cee7bf0ee1f8668b7dcd78c4de67daa76923ca96adc99b189d929043

    SHA512

    1226f0694228851d97b64b4c5ebf7a1e93c1f7f60096ccb68b3903e302579681b9d02dda8e7d51aa340d6111891711be4dc15dff731d9eeb3a960b072571895b

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    f9e4e364158dc66823fe26f2227d03eb

    SHA1

    f56dea8914649713dad220427df024cd3bca6453

    SHA256

    7d4c5079bee79d5d856ce4fe780adec57cc944dc07668ae4d2e47b2fe7fa3890

    SHA512

    50cdd7fc56d41f6217e1f632e866cae155cffdefe0954c8e3be7a2df258b30e455fc4ac150625b7a6119b2be8da22a597b91596469c8dbfdcab6c5ad4c1f1f29