Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    10-02-2025 22:09

General

  • Target

    8e364b555eb96224ada62732fb6fe4653b4c33e3d4bb8611f5e74009447cad40.apk

  • Size

    212KB

  • MD5

    8ffad0844c1df97400582867e9b27142

  • SHA1

    0e8d6ecba651be2faf9d06916499dbd996df1299

  • SHA256

    8e364b555eb96224ada62732fb6fe4653b4c33e3d4bb8611f5e74009447cad40

  • SHA512

    990c2f8072d6771de4d636c8ad0abb0abf0174d4aa53d4bb250117c332ced389f8434b954dbe5bcbbaa5b5863d27ad599ffc886d75feab302d6498e122d5cf4f

  • SSDEEP

    6144:qqurEEoO1HVNVGtuQgc6fL2netu69B57f1L8Ef5VmZ:q1roOJR6uTLCn369B5pXVmZ

Malware Config

Extracted

Family

xloader_apk

C2

https://m.vk.com/id730148259?act=info

https://m.vk.com/id730149630?act=info

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Mobile Safari/537.36 Edg/112.0.0.0

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Signatures

  • XLoader payload 1 IoCs
  • XLoader, MoqHao

    An Android banker and info stealer.

  • Xloader_apk family
  • Checks if the Android device is rooted. 1 TTPs 1 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 4 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries account information for other applications stored on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect account information stored on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Reads the content of the MMS message. 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs

Processes

  • lnvisrc.kztuwuyau.ttklfx.zkpiunme.fjpre
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    PID:4489

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/lnvisrc.kztuwuyau.ttklfx.zkpiunme.fjpre/app_picture/1.jpg

    Filesize

    7KB

    MD5

    044e5a6048e0509ce507f99855f90507

    SHA1

    7688f5b6c713c77aa80f5cf1b0fd7d1a3a6c931f

    SHA256

    1ddd2d738aa655cafb9a5215e26930579a523b661f459a6cceea8fbc4218c29c

    SHA512

    a4822a126d10667c978b03bb51e0c8efd28169809f0f82a253bcebe83e716452d16189a224bbfc0e6e8d36f42e898b80bfbf731fd2c44c17298285e4db3ebcaf

  • /data/data/lnvisrc.kztuwuyau.ttklfx.zkpiunme.fjpre/files/oat/b.cur.prof

    Filesize

    978B

    MD5

    a03d6d48af9584fb0a29d2e2574b6855

    SHA1

    d80e5d3996c3e56dcb646e698c088f475fe11fcc

    SHA256

    ba43be25e0b56c8f3eb7bf4763fdbe3838f9a20171d87ebf81efe33e3d6dd47a

    SHA512

    4eaa0de661242031db0a302dc3c8150bd0812d137beea840e6638245c4ca772828bd7185585497f83d7b8d134aee87ecdf8ffdbf43a58b571b1ef0d54c0611ca

  • /data/user/0/lnvisrc.kztuwuyau.ttklfx.zkpiunme.fjpre/files/b

    Filesize

    446KB

    MD5

    11a84e2abac900abbf3f4ba5cf50d1be

    SHA1

    67684ec3853d85063a507d16f2d68ebb608f2df1

    SHA256

    b5a19dd0a05f68cc4ce6302fe14b763803d95353dfc832ddd6ba9445006f5349

    SHA512

    9f6f9b0370494a361eb3b908bd9c06e3daf1a07779ca9eb1e83f0984087ae3bf5cd9b042ee37a16d112d3e6f1724cfc5515eaa168fadd200f7ffee882310adb4