Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
26/03/2025, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
19278db5549027a224f9436c45ffdf0a0dc5ac630335fb2d9ff9d44da0f267b0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
19278db5549027a224f9436c45ffdf0a0dc5ac630335fb2d9ff9d44da0f267b0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
19278db5549027a224f9436c45ffdf0a0dc5ac630335fb2d9ff9d44da0f267b0.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
19278db5549027a224f9436c45ffdf0a0dc5ac630335fb2d9ff9d44da0f267b0.apk
-
Size
3.9MB
-
MD5
9d6c50c4103251cd45f93b380bb48bd6
-
SHA1
1990d07867ec04fd0fb791bd347e2b410da5d114
-
SHA256
19278db5549027a224f9436c45ffdf0a0dc5ac630335fb2d9ff9d44da0f267b0
-
SHA512
35cad8d62c1d12bdfd499aa5720474df34d6ebf4bb577c5f5205c2e13012fb401c33605ae63119b5fff1bf86ce30e22faa9e038d06913a345831365b7bfc4c03
-
SSDEEP
98304:CVyFi2cpk0uuKmiiaiAOFO4O4sbrrLOrGvIej4OAizcP9mtz:syqH/apOFO4C2r1extcP9mtz
Malware Config
Signatures
-
pid Process 4375 com.xsyhwp -
Checks known Qemu pipes. 1 TTPs 2 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/qemu_pipe com.xsyhwp /dev/socket/qemud com.xsyhwp -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xsyhwp/cache/payload.jar 4400 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xsyhwp/cache/payload.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xsyhwp/cache/oat/x86/payload.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xsyhwp/cache/payload.jar 4375 com.xsyhwp -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xsyhwp -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xsyhwp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xsyhwp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xsyhwp -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xsyhwp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xsyhwp -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xsyhwp -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xsyhwp
Processes
-
com.xsyhwp1⤵
- Removes its main activity from the application launcher
- Checks known Qemu pipes.
- Loads dropped Dex/Jar
- Acquires the wake lock
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
PID:4375 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xsyhwp/cache/payload.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xsyhwp/cache/oat/x86/payload.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4400
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5abf8b1bd3424809b49604c0a04d7ba5f
SHA199d4265ce73d18176839fccf00d9a353f9543aa5
SHA25684813f4a345d5b552eadf4508ce22bf9440226e59351d7158771dbca30eb9eda
SHA512f4a52cf875133a5f81c45abd1da380a8a7de1dd80593152f5a998a0f67a1c57e720167c2c28e40755fcd3357313e8c39bcace430941a30331624a74293e9fcca
-
Filesize
472KB
MD59f093ab21f4efa18069addd51279bd06
SHA1591062cbc092b10742e16f3451bae479679f27fe
SHA256a8b4c1ceb5f1a3de7c998c12b8bc26f9cbe2ee8bcac522b7c54e9d49505774d1
SHA5123da3ec9b7d5d00373894a198170fcdec9e80d25615677c24b6e57f79bda1a603db44ac875c59aa87aab67017d6da4c273bd65f62d3ee559d54b33bf4a8edbf74
-
Filesize
1.1MB
MD506721937887c0fbc9516fe483c58da10
SHA1d31bbbf7e7f08684b6cb286751a0b1aa656a2fc4
SHA2563bc6b39624ac9ecdd024903b4a0e20cd39d6ea4df6de176f7b679a1b132c4dba
SHA512a438f33ff75522506f3de0cccaa7b0525d9b733a74d5587902d45dbfff0245080bd3825bf9b2324045e52152c547d80dfb54344d5b6d20b4e41e6820eb484068
-
Filesize
1.1MB
MD542bd2141a746ab06dcddcbc993b8a1c9
SHA11583c437e5aa6eb628f6afca10bddee38a501451
SHA2565e10c8dcba719cab710ec6d9c0626569af7664527247d50e29e1f758b745d1a8
SHA5122d946e368b008ed309481c78d802ba2c04b87e38c9b0506144e1b6212036617007d1adb180c590df178c91fdd74e4d3c1d713b3119ddd7f921352a81d44d4c56
-
Filesize
36B
MD5a299852f66b84483f4118a999ebed5e8
SHA1c3020ad520ef5d4d62c86410fa94a93578f2b076
SHA2569f21dd0f2b172e617b9ae6753d950e86bd6d20b0936fc9fe7de0b01df0cebb2c
SHA512b646953bfa93aa26b18223b0943a5d8b4d818e12d91aa2630fc6883205ce73150be613d00c7c433a010f88f2d4a6b03a061e11e8d70b4c899526c0bb3d925cbd