Analysis
-
max time kernel
75s -
max time network
302s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
20/11/2024, 13:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ULoan-v102.apk
Resource
android-x86-arm-20240624-en
7 signatures
300 seconds
General
-
Target
ULoan-v102.apk
-
Size
10.4MB
-
MD5
6552ccfc688ecb1657932284691a9be2
-
SHA1
2f565f53b45e2d4afbc734dc07a95e9b49d00bad
-
SHA256
7e180b24b35090f82580f0928c753d3d3f52f1739b8f3d198886b1d9cc7ca61b
-
SHA512
30eec78ff853f42086126e5a7c67a35fb87ccdbc93a3134e6534c644eccc710f129e2558a6fa971ca74cd10335723f7c617aa49b9841aa7f79778625d26ab711
-
SSDEEP
196608:ARWx+i4phIdHRxMwhaI3nrfSiT7JboxLoAo8j149XvOzbUKqWHH8NOu0eHxacLfi:As+iXxRxMvqeiT7xoi6BIawKqmSOupx6
Score
8/10
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /system/xbin/su id.max.uloan.app /system/bin/su id.max.uloan.app -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 sites.google.com 10 sites.google.com -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone id.max.uloan.app -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver id.max.uloan.app -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal id.max.uloan.app -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo id.max.uloan.app -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo id.max.uloan.app