Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    19-12-2024 22:08

General

  • Target

    b409e3bee023901233df48060fd28c282262916e8e23e255482004988d84ac5a.apk

  • Size

    260KB

  • MD5

    373755d22231843b03f4d3990ff33d15

  • SHA1

    43bc75597657696eff545cb21a882899f2952f2e

  • SHA256

    b409e3bee023901233df48060fd28c282262916e8e23e255482004988d84ac5a

  • SHA512

    3d3cd393346bfe252608fd2ae65a599bbf303b5ab5a014675e63d1a4a558de359d2eecba85d7e64245420e82c42737d974306d48ddbdd3c852aae8fb148aa553

  • SSDEEP

    6144:nCyQtGRBvux5RvIXvj96VPbPeHz056SIxMuMs4SC4VIc8n:n+QluxPWvyI1RCMIbn

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Xloader_apk family
  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 5 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • zusqzyu.bfdmucmrv.tvvyut.yruqbdub
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4251
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/app_picture/1.jpg --output-vdex-fd=46 --oat-fd=47 --oat-location=/data/user/0/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/app_picture/oat/x86/1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4278

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/app_picture/1.jpg

    Filesize

    7KB

    MD5

    5f965210c47b1f9b8f524fca08f18d2b

    SHA1

    0b364aff5bcbe17dfe8262368b3b8c120fc8a797

    SHA256

    62cee1885e161637d946026a4ccb7e5f1d16ea147b3332c7b27e328c19c1b71f

    SHA512

    841e10f529419dafcc13ade2065d50ae162d786e2853c14088451cb7f49c997fb9a27e4acd32740f10208cd37479f5305644b3f393509a0fc1de4b6b4f3104d4

  • /data/data/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/files/b

    Filesize

    446KB

    MD5

    3e04a3b314779ab7b515b04648084b64

    SHA1

    4b76a4fb951eb54b6c8593f50f4b7cc58b2997f1

    SHA256

    d24fc9979ea6d5e9a278ac59c422f3b189adbe5671a3be0f8e44c52a50af78b7

    SHA512

    cc87dbada39c5c2396c105d0a7dc9351ef70621261f5a892ecee526b4eac769e721f97ec1913f37dc092d46393c0f6a5d75dfb43fdcb6270236fa8a633ffe984

  • /data/data/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/files/oat/b.cur.prof

    Filesize

    1KB

    MD5

    fbc892dd8ed5bad719ae6def271f33a4

    SHA1

    71be900f44160f0d88f5256529a21cb114582974

    SHA256

    a53979bf7e022877b7911639c103621c7780493aa6b469cf3cce09b5afa54595

    SHA512

    09f1add655f64303d555fe20b5c5acd072be848cdc19415ea745a4b2fc6fea9ffb0ca39153d68fc62cb37d069f74c23b4434afaab75c62062a89c6208652dc13

  • /data/user/0/zusqzyu.bfdmucmrv.tvvyut.yruqbdub/app_picture/1.jpg

    Filesize

    7KB

    MD5

    20adbc162c7856dc04fa777395f0ab00

    SHA1

    5a32fb912760a4fc9fa37d100eb5a75a31d27e84

    SHA256

    3d5c892618b13426de5d70be41082235c4ac8e66c02d842c2dec3335e22582a3

    SHA512

    c5d05b076c452268728d50894d9577fee9fdabad923aa95985a9f38b35371dfa6878f162e709e0b7f71feacabd2164dbeb3dd76413a88fc2c598e65809d9960f

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    6d2f1b86beac839afc9cd7fca5519460

    SHA1

    004e08e8317473a6a5a84455a1fc6b63cf80dff9

    SHA256

    c09e218e82843a8c13572b40ca7f414853d33de9348efdb3f8e3c6cb5627aef3

    SHA512

    5cdc769bb80fb748fbd54ac10055747544fe77d3df1d597668e4db11c0fc41435f77ea7a59d0fa773f3867b9d077cdbd9eca6101d92d0b35f56d5e5ac267cea1