Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    12-11-2024 22:04

General

  • Target

    e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.apk

  • Size

    288KB

  • MD5

    b00b9b9360331a8066931934cd88fc26

  • SHA1

    1adcaf0afa08d5b49ec23382899539c3555270af

  • SHA256

    e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550

  • SHA512

    989600bd76d896345cfc6b046d3e0e2375412c7debe9e9ad73ec7f983a190204832f38a74d552783930740dcf5ac131ab35b863334dd1f6bcb3c42676a05f46c

  • SSDEEP

    6144:AKJ7r1V32l3IeWQUktM7SedNDGFOkmep0DpDWScMZeBBxnf7Ucpzq9R+Bo8/y5Y:rnH3SYeWqtM7VAmLJW1TRc9sC5Y

Malware Config

Extracted

Family

xloader_apk

C2

http://36.231.70.96:28856

DES_key

Signatures

Processes

  • ayq.tjk.xhzu.sowc
    1⤵
    • Checks if the Android device is rooted.
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests changing the default SMS application.
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4331

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ayq.tjk.xhzu.sowc/files/b

    Filesize

    509KB

    MD5

    949d963c3c9097ef6dc4be634ff90762

    SHA1

    c888376f3e299c7eb9718803926f4200c5d0ba0a

    SHA256

    5836b3ce3820b9bd8b0ccf5438f66ca083f84c04b717af23163ee50903935867

    SHA512

    30cc6ecab7953c64f1883e5156a87e80f2c342143e552872d0fca4624f95da4f7c4a024f38ed2380963897a7c788ad202a067d97602f61155e500ebe292f2c43