Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • submitted
    15-01-2025 22:07

General

  • Target

    cd344646890096ca427e1e645bada47c6cb4457e86560542057d78c25102d925.apk

  • Size

    212KB

  • MD5

    d2cb9f7bdc8099ceebf33bd38eb4b268

  • SHA1

    a5fa6ad59ac5cda96f5754b747cb9d5007a5fc3c

  • SHA256

    cd344646890096ca427e1e645bada47c6cb4457e86560542057d78c25102d925

  • SHA512

    a97b3228e0cdeb52a6e324399899db6e7cca6ce8dffd6aa99773c23d3344c24aa8de84a35ca9c8f6edd08a74c6fc811961b519bd421b613c1e3e5d127ac33ff0

  • SSDEEP

    3072:krl/iOqib86bmtle3mfq4FG3koARfh3mGD6R2qbD6effVQy5rlAch:ml/i8g7fvG0Bh2GD6R2e6e335hlh

Malware Config

Extracted

Family

xloader_apk

C2

https://m.vk.com/id730148259?act=info

https://m.vk.com/id730149630?act=info

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Mobile Safari/537.36 Edg/112.0.0.0

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Xloader_apk family
  • Checks if the Android device is rooted. 1 TTPs 3 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • mkaqjln.ypxhonmtz.xxsjpo.zgqbobhw
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    PID:4315

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/mkaqjln.ypxhonmtz.xxsjpo.zgqbobhw/app_picture/1.jpg

    Filesize

    7KB

    MD5

    0692bd294dc3c952df4b4f08e2f989bd

    SHA1

    b3ebcb6611690f8cab312216559a535368d5a182

    SHA256

    d55e6c792a60633711a0d005c30316b27784b6597e487249012d9f26cca92aa5

    SHA512

    d6ab4f2359ebf9e470ed68fc38a9912fbdb345d5ec64a55e0416622991f6751571770f6e44f69baf23ac7c199361ece0f6994fa5937941d3465bbbb22ee68aa7

  • /data/data/mkaqjln.ypxhonmtz.xxsjpo.zgqbobhw/files/b

    Filesize

    446KB

    MD5

    11a84e2abac900abbf3f4ba5cf50d1be

    SHA1

    67684ec3853d85063a507d16f2d68ebb608f2df1

    SHA256

    b5a19dd0a05f68cc4ce6302fe14b763803d95353dfc832ddd6ba9445006f5349

    SHA512

    9f6f9b0370494a361eb3b908bd9c06e3daf1a07779ca9eb1e83f0984087ae3bf5cd9b042ee37a16d112d3e6f1724cfc5515eaa168fadd200f7ffee882310adb4

  • /data/data/mkaqjln.ypxhonmtz.xxsjpo.zgqbobhw/files/oat/b.cur.prof

    Filesize

    830B

    MD5

    2af3b7b57f8c3b2b31d1b5ae3549c67f

    SHA1

    6cd69e6a731a57ca8947f5583b384541d94074a3

    SHA256

    a2a9dbbf50387604b0009066c59e557de0cad98e6315fd22cfc6cb95edc6282c

    SHA512

    af6981569234ed7f915b4040d577ee81533c9c1e4c2ff62f0a6cee378088ab7cff9e4fdb75912259a469fd3d5ce122a9e8e1a83391428e4836382476af8ce25d