Resubmissions
16-12-2024 22:36
241216-2h95essrgn 1016-12-2024 22:35
241216-2hv1haske1 1012-12-2024 22:08
241212-118hwaypgt 10Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
16-12-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
49fe54988c981d54448e9063a9cf867eced8a34ec0e13f94263e5a6d508cc4c9.apk
Resource
android-x86-arm-20240624-en
General
-
Target
49fe54988c981d54448e9063a9cf867eced8a34ec0e13f94263e5a6d508cc4c9.apk
-
Size
260KB
-
MD5
01b53f573b3fa9455ca93328836cae44
-
SHA1
d94f0b8e269650d8642a8bfdcc3a7aff3e5d688e
-
SHA256
49fe54988c981d54448e9063a9cf867eced8a34ec0e13f94263e5a6d508cc4c9
-
SHA512
a72ff73a1ddc5b01f8022d14c13ea961b4c1599f89ff9b1bdcaa6701e6a145d4a6a1d6e74d6bc3c97a6b07cf0b89d6afbd680f582a586cd1f08cad0888b13165
-
SSDEEP
6144:Jb7PcyO2onwwr3w+4m+qRFfJtl9rrAJEzrwdaj/ea:x7PZ3wrwERFTHI2wMZ
Malware Config
Extracted
xloader_apk
http://91.204.226.54:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Xloader_apk family
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su nanwceu.dwsqumtlj.gteuih.rmrcieex /system/xbin/su nanwceu.dwsqumtlj.gteuih.rmrcieex /sbin/su nanwceu.dwsqumtlj.gteuih.rmrcieex -
pid Process 4264 nanwceu.dwsqumtlj.gteuih.rmrcieex -
Loads dropped Dex/Jar 1 TTPs 5 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/1.jpg 4264 nanwceu.dwsqumtlj.gteuih.rmrcieex /data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/1.jpg 4291 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/1.jpg --output-vdex-fd=46 --oat-fd=47 --oat-location=/data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/oat/x86/1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/1.jpg 4264 nanwceu.dwsqumtlj.gteuih.rmrcieex /data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/files/b 4264 nanwceu.dwsqumtlj.gteuih.rmrcieex /data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/files/b 4264 nanwceu.dwsqumtlj.gteuih.rmrcieex -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts nanwceu.dwsqumtlj.gteuih.rmrcieex -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ nanwceu.dwsqumtlj.gteuih.rmrcieex -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock nanwceu.dwsqumtlj.gteuih.rmrcieex -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground nanwceu.dwsqumtlj.gteuih.rmrcieex -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS nanwceu.dwsqumtlj.gteuih.rmrcieex -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver nanwceu.dwsqumtlj.gteuih.rmrcieex -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal nanwceu.dwsqumtlj.gteuih.rmrcieex -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo nanwceu.dwsqumtlj.gteuih.rmrcieex
Processes
-
nanwceu.dwsqumtlj.gteuih.rmrcieex1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4264 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/1.jpg --output-vdex-fd=46 --oat-fd=47 --oat-location=/data/user/0/nanwceu.dwsqumtlj.gteuih.rmrcieex/app_picture/oat/x86/1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4291
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD56e3d5abb898c63db78eb632d0c14fdd7
SHA19af6a21cbe014da4341753d0f8676a6570555354
SHA256ce92b9e04bd582376ce5a7fea2d11903401a82bf8b32f775ee56aa5529768bfd
SHA512abe62091ba6d6e376469445168cb6e8ad170934eba89166944550ec2acfb7a1106fafe836b250054fe3f43a2df9d034139b9934aa9dbb3c935e185f2f9a058df
-
Filesize
446KB
MD53e04a3b314779ab7b515b04648084b64
SHA14b76a4fb951eb54b6c8593f50f4b7cc58b2997f1
SHA256d24fc9979ea6d5e9a278ac59c422f3b189adbe5671a3be0f8e44c52a50af78b7
SHA512cc87dbada39c5c2396c105d0a7dc9351ef70621261f5a892ecee526b4eac769e721f97ec1913f37dc092d46393c0f6a5d75dfb43fdcb6270236fa8a633ffe984
-
Filesize
1KB
MD5440988ca6a6ea20bd6b0d9d3b6baa910
SHA14fe915bcea9c66ae5d6b08fba7218f3fe508204b
SHA256fffa4a06d745f98412e1b5ece01a435068f0843e43a572a6ab5b8b257e89175d
SHA5129300a98efc5b462e66529a776611e2ae9eacb145f31f3a887728434fabea13613047b50f79a4966f42eab69b5176f37029aa69364af78decc165bead750741ed
-
Filesize
1KB
MD56682199402676ef538387d25b7ef5c86
SHA17a673d50a2c154ffa29558afc10f828fd5459555
SHA2568c6d5240b3f033d13f2161639f7d47fb160651a29bbed81222288a6461c41429
SHA51298636acd2e08c4be05aab32669e20d591c2a8e77fe3b4bf7f8183119f95a26003415b3cf7692c1d2ac22698886de2f211d51f69dbd896ba485716d3017312d49
-
Filesize
1KB
MD52e090221dab44a534c79057c39c6321a
SHA1070335d177133e977e55d075278ad564d3108c77
SHA256b4418223c9109c8699e77961cbf607b4fd31b76214020cf94408543c25840662
SHA51214852530354a3c67c3091da216a332f7dd131a7dbf95e6fb8b4245627cacb3120077bf279af1d30ba6893026e64663230070baa9a463cdce27dd1acc1c473733
-
Filesize
7KB
MD5040b4981b4cb12c8ede2956603c27972
SHA1664b4b42b9e4e88d5599c39cdfaf6344b738011d
SHA2562a197e67c8f62c448cffe0dc4c5aa7aa57479e27910d0cfee327fa75d7c17868
SHA51238282767607771d799aaac31ab51b2e0344486232d607b13ad676b0f5cac22cf34f7bcd0815190745d4b310b2217031e9911b7644cea1a570ab4b29aa39b3e9a
-
Filesize
36B
MD5c8d8b5580c5508a53fe64273c4d7232b
SHA1f9192005083420d1259319838b6469ea0f0a52f0
SHA256dcbf1602974a03280f617fd898151a42d49395efb4502ca4c070ec1968d0a206
SHA512d0bc79de031087864d4f77ff4192312e061426533adccc2f0d5ffaa2f3a5e0d5e8db0ad99615bd66799b63396c1ef2ca4bfad3c9db7aea542074076abe1cd87a