Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    07-02-2025 22:03

General

  • Target

    3b990406a1422c57d8ae53688db8c959c1b725e2e4d3153430b5d8382aa84e10.apk

  • Size

    212KB

  • MD5

    1f4256fd659edc89ea287fd8b325a759

  • SHA1

    ff309bc47b978a392384250eab446b78e119eb43

  • SHA256

    3b990406a1422c57d8ae53688db8c959c1b725e2e4d3153430b5d8382aa84e10

  • SHA512

    f67dc4cd1d9af016a6ed06a752bfa631593fff7e286311e08dafd92176e42169a2ce7a5a57e72b9b33814ea7c10d5f67afa1683208faab6a0b5fe51e4588395a

  • SSDEEP

    6144:77DorOqJmln2uF1O0oqogUZ78bdxmPIFyGROnR:gOq4pF1O0ovgp5QP6yOo

Malware Config

Extracted

Family

xloader_apk

C2

https://m.vk.com/id730148259?act=info

https://m.vk.com/id730149630?act=info

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Mobile Safari/537.36 Edg/112.0.0.0

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Signatures

Processes

  • vlpszhe.rzyvyodms.lcweol
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4423

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/vlpszhe.rzyvyodms.lcweol/app_picture/1.jpg

    Filesize

    7KB

    MD5

    5d7f1b54d46854a888c16d5d9a8698c2

    SHA1

    c629d5d6a207eb764c50b51e95e8e05c8a4d4d6e

    SHA256

    1de5d03a994d89bccbc171ca0a955c824bf0dd93395eda0f81a14a6e20d4399d

    SHA512

    42f937672502f93d1ae462844b8261d796a122b4ecb20220932efa7f5883b697300a00f16bb3f8061bba30091c30db5d8ddc7707d6da0f545ab6e6f19b4dff31

  • /data/data/vlpszhe.rzyvyodms.lcweol/files/oat/b.cur.prof

    Filesize

    1KB

    MD5

    8fcd21ecc7f0c7121aeb6b8e60a61de0

    SHA1

    433d4b62029cffeb79f92d0723f74c6c979c61f6

    SHA256

    84fabcc693596063f20a77031537ef3fa67d309cc82faa1d3ddae2ebda0fe4c5

    SHA512

    bc476b42b78a108a6e88f11f8eca73daaa20bbcf53e112095ebd376c7f253a50b3183ad61873cb5da75aa568efddcad0b980d4cef677a66c3640516375df1f14

  • /data/user/0/vlpszhe.rzyvyodms.lcweol/files/b

    Filesize

    446KB

    MD5

    11a84e2abac900abbf3f4ba5cf50d1be

    SHA1

    67684ec3853d85063a507d16f2d68ebb608f2df1

    SHA256

    b5a19dd0a05f68cc4ce6302fe14b763803d95353dfc832ddd6ba9445006f5349

    SHA512

    9f6f9b0370494a361eb3b908bd9c06e3daf1a07779ca9eb1e83f0984087ae3bf5cd9b042ee37a16d112d3e6f1724cfc5515eaa168fadd200f7ffee882310adb4