Analysis
-
max time kernel
10s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
21-12-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
80022a490696d7be66d1c2376f5990c94b002d186385faf72e062c260f53e35c.apk
Resource
android-x86-arm-20240910-en
General
-
Target
80022a490696d7be66d1c2376f5990c94b002d186385faf72e062c260f53e35c.apk
-
Size
212KB
-
MD5
be932a5bf7bbebd75e9442a15dcd972e
-
SHA1
0905bcc5b66a25f0894442bac420842345c0cac9
-
SHA256
80022a490696d7be66d1c2376f5990c94b002d186385faf72e062c260f53e35c
-
SHA512
d3b0e2684972b75945152c508e482223e26f3d1cabef15f1924ac7553644a16b24718b94ab0a04f5eeca9cafb109280fcb2def5994aa138f494ad5746bce488b
-
SSDEEP
3072:tqwV//AapbWfPP5d7G3ASs7Dcgh9J3hH21Bvu4MiUDxML0vpN0GoY0UX0LcnbY:tqOnAaRKPniQpXc+9HW1puiU9MgPVpY
Malware Config
Extracted
xloader_apk
http://91.204.226.54:28899
Signatures
-
XLoader payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Xloader_apk family
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/xbin/su unymzpb.nvbodzfiy.qaqlza /sbin/su unymzpb.nvbodzfiy.qaqlza /system/bin/su unymzpb.nvbodzfiy.qaqlza -
pid Process 4409 unymzpb.nvbodzfiy.qaqlza -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/unymzpb.nvbodzfiy.qaqlza/app_picture/1.jpg 4409 unymzpb.nvbodzfiy.qaqlza /data/user/0/unymzpb.nvbodzfiy.qaqlza/app_picture/1.jpg 4409 unymzpb.nvbodzfiy.qaqlza /data/user/0/unymzpb.nvbodzfiy.qaqlza/files/b 4409 unymzpb.nvbodzfiy.qaqlza /data/user/0/unymzpb.nvbodzfiy.qaqlza/files/b 4409 unymzpb.nvbodzfiy.qaqlza -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts unymzpb.nvbodzfiy.qaqlza -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ unymzpb.nvbodzfiy.qaqlza -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock unymzpb.nvbodzfiy.qaqlza -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground unymzpb.nvbodzfiy.qaqlza -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS unymzpb.nvbodzfiy.qaqlza -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver unymzpb.nvbodzfiy.qaqlza -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal unymzpb.nvbodzfiy.qaqlza -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo unymzpb.nvbodzfiy.qaqlza
Processes
-
unymzpb.nvbodzfiy.qaqlza1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
PID:4409
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5734eb81c2766fb7a64ca45b83919ed78
SHA1cf93404093aff2c2bf94aacee735547371366df7
SHA25654ff4e3076d25067ccdcad7fe2047dba36c5275d88318fd0cc5a4556f9cfcca6
SHA51219f3161e1324a2e61c76856846f1da62bf86156ef274315454bcd05dff1e92aa958d6fdc568b66da7fa240fb8441ac3d88f7d7cf6014ae68bd70c57877c01c8b
-
Filesize
446KB
MD55705e5b58e9503402cf66c15fbc1d854
SHA1ac943d94e87db55183a1cf24517c3d40361a2d03
SHA256c8e371d5021bc1f77ea2062c2a568ada090e464099596476536816b4feb1f5e8
SHA51246ed8f6f3a670ef3dbf0477353d3da5a19f3a188b51ee8cea492e3a6ffed77d14663eb1732bc084bdd78f4fea0a4190c39399a20aa2f6b6c92fc91bded97e70d
-
Filesize
8KB
MD5c801831b2615575a1942474790270f49
SHA131a006547be752bdefb56ac336dae21fa61f96bb
SHA2560d6639c37930bd9f4c6f770f52d4a9c2878fdccd9f406dfa91184970eb1e90f7
SHA5123e6bb829425223e2f38ac479d8da163ad114fea280fa0f407ccc55673d77df21b4766340bcb6b77b4f4e66922732d5189fc7333dc21b1cc7243830b6778d7e6d
-
Filesize
36B
MD5d9d1405c2c8cbff5efbdea36e9c7b2e3
SHA1fd7cd698d1a91139a9617ec12892f7cddfc15403
SHA256842dc1151f66f79ec3345579f677828c95651f37de993e223fc242808aaed729
SHA5121346ef00829325874170534a9f9cd42b0145c3d680b1c2c6787577e5633efc4ca5416060551817cb71c7d827fe10130db9879e7024a4d055bdf38b858f317f79