Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
177s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
06/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
656b5b491bb6edf396db2f252503b1da091cfdeefd0b3e6ad7c6146c1c3b8def.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
656b5b491bb6edf396db2f252503b1da091cfdeefd0b3e6ad7c6146c1c3b8def.apk
-
Size
284KB
-
MD5
6c2d717ac77a95f724e1400e1c605d9f
-
SHA1
3e312fabff5e8f28e49d9052145b840df970780f
-
SHA256
656b5b491bb6edf396db2f252503b1da091cfdeefd0b3e6ad7c6146c1c3b8def
-
SHA512
c30f93dea8953983cbe4c6e7c77978118ce9c25f4164bd6d89fe95ae9fd4cc1a9a1b4b2eb3ea9a2999b798d481f767d324ffab9ae317753c53254369e04fdf8a
-
SSDEEP
6144:2qO2X0usLaONTrsGD4/urPlDVXxF6t3tPdSB7qTV+BcE0j:zV0usLTwaiQ91KVdSBCE0j
Malware Config
Extracted
xloader_apk
https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic
https://m.vk.com/id728589530?act=info
-
user_agent
Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/memory/4522-0.dex family_xloader_apk behavioral1/memory/4522-0.dex family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Xloader_apk family
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /system/bin/su sq.lin.qoub.otaqmp.etg.ll -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/sq.lin.qoub.otaqmp.etg.ll/files/b 4522 sq.lin.qoub.otaqmp.etg.ll -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ sq.lin.qoub.otaqmp.etg.ll -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock sq.lin.qoub.otaqmp.etg.ll -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground sq.lin.qoub.otaqmp.etg.ll -
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT sq.lin.qoub.otaqmp.etg.ll -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS sq.lin.qoub.otaqmp.etg.ll
Processes
-
sq.lin.qoub.otaqmp.etg.ll1⤵
- Checks if the Android device is rooted.
- Loads dropped Dex/Jar
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests changing the default SMS application.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4522
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
509KB
MD556cdeb711771883abba58bf795547d6b
SHA1b8681cb2081046dc3c6effebd4aca20fa35833dc
SHA256e29751533b08a75674acdf64a56219c35364c62a4559e18ca941821c21af304d
SHA512079dcc4c8000f74de910b9477919b595315181531cb804587165d8ebed6777f86c0379eae4409804035870d1468b6101883acf35d394638afcd79163d41b4a4d