Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27/03/2025, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk
-
Size
205KB
-
MD5
b46157e537fddb256f8ebf5965edd34b
-
SHA1
410e4332d470e764e13ab8016cf4cc23fb74f64e
-
SHA256
7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a
-
SHA512
6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a
-
SSDEEP
3072:s/AiTJ7pW7LD4zlROiv8pWgy6bTOpuFFyIMDb9aoavzIJLPKi9sLH:ebTJ724Rfv8pyX6DMDBAGJOz
Malware Config
Extracted
xloader_apk
https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic
-
user_agent
Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36
Extracted
xloader_apk
http://91.204.226.105:28856
Signatures
-
XLoader payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xloader_apk behavioral1/files/fstream-1.dat family_xloader_apk2 -
XLoader, MoqHao
An Android banker and info stealer.
-
Xloader_apk family
-
Checks if the Android device is rooted. 1 TTPs 3 IoCs
ioc Process /system/bin/su ngur.qlvem.ofnld /system/xbin/su ngur.qlvem.ofnld /sbin/su ngur.qlvem.ofnld -
pid Process 4262 ngur.qlvem.ofnld -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/ngur.qlvem.ofnld/files/dex 4262 ngur.qlvem.ofnld /data/user/0/ngur.qlvem.ofnld/files/dex 4262 ngur.qlvem.ofnld -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts ngur.qlvem.ofnld -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the MMS message. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://mms/ ngur.qlvem.ofnld -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ngur.qlvem.ofnld -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground ngur.qlvem.ofnld -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ngur.qlvem.ofnld -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo ngur.qlvem.ofnld -
Reads information about phone network operator. 1 TTPs
-
Requests changing the default SMS application. 2 TTPs 1 IoCs
description ioc Process Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT ngur.qlvem.ofnld -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver ngur.qlvem.ofnld -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal ngur.qlvem.ofnld
Processes
-
ngur.qlvem.ofnld1⤵
- Checks if the Android device is rooted.
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Reads the content of the MMS message.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Requests changing the default SMS application.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4262
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD5c908b637c002940ef72c0f34eda33115
SHA1c886b4786f696ca4be26516a83e842863e71f728
SHA256125b57669edb6060fea0e71718ea17c957186496c2c1ea010d95c64218fe31ae
SHA51257eafa70138d9b97af7c3160306133f1591f015563f4ebe21cb4a0354a6c2a380e246de64ea54d492e84d433b77b50d887ebdd3566002799abdeba66742ec350
-
Filesize
1KB
MD5ef4b7380047aa9a3ec9f07b1f88ee597
SHA199317dd3739abaabb43271cf9ade07881288b9ca
SHA2566ceadba19b87e0de4c29293d5b39ee979deebe9a758883b007cdb498f8d0e8be
SHA512c77e48055b97638bfdebe5ae623d41ad51bdafb7a31f6fb04241f1b285710d70a64774653920fb9aef7f5cba2822d1dd52d87fd9278a7d1a7f9032a493949c24
-
Filesize
36B
MD55c99f2cdf689007b5219df2819992c04
SHA122d0e1a1942f969cf8a03978264c59e006e3456c
SHA2567d1559d9574f6e2b698f8915f969a5e56f1d33e3941c6630c3ef274f1da224eb
SHA5129f7932164ac2204fd4ed88a94213c6aa2985980cf04615f463c6e529be22a468cc410e668e589651258b23cf4427128fe4acaca7fa6ac8410509754eb2619fcb