Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-11_x64
  • resource
    android-x64-arm64-20240910-en
  • resource tags

    arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system
  • submitted
    27/03/2025, 02:25

General

  • Target

    7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk

  • Size

    205KB

  • MD5

    b46157e537fddb256f8ebf5965edd34b

  • SHA1

    410e4332d470e764e13ab8016cf4cc23fb74f64e

  • SHA256

    7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a

  • SHA512

    6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a

  • SSDEEP

    3072:s/AiTJ7pW7LD4zlROiv8pWgy6bTOpuFFyIMDb9aoavzIJLPKi9sLH:ebTJ724Rfv8pyX6DMDBAGJOz

Malware Config

Extracted

Family

xloader_apk

C2

https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28856

DES_key

Signatures

Processes

  • ngur.qlvem.ofnld
    1⤵
    • Checks if the Android device is rooted.
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Queries account information for other applications stored on the device
    • Reads the contacts stored on the device.
    • Reads the content of the MMS message.
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Requests changing the default SMS application.
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4816

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/ngur.qlvem.ofnld/files/dex

    Filesize

    454KB

    MD5

    c908b637c002940ef72c0f34eda33115

    SHA1

    c886b4786f696ca4be26516a83e842863e71f728

    SHA256

    125b57669edb6060fea0e71718ea17c957186496c2c1ea010d95c64218fe31ae

    SHA512

    57eafa70138d9b97af7c3160306133f1591f015563f4ebe21cb4a0354a6c2a380e246de64ea54d492e84d433b77b50d887ebdd3566002799abdeba66742ec350

  • /data/user/0/ngur.qlvem.ofnld/files/oat/dex.cur.prof

    Filesize

    1KB

    MD5

    2573f52d4c2ab77e56c6901ef36bc22f

    SHA1

    da6b2e97ec7ad277ebfeb600ba7da6158340dc93

    SHA256

    f6b01cf0af6f255fd7a5f44712b6c287d0a3b1fd0ab941be13f2789a24034244

    SHA512

    abd495c0496481f7c6ef4f745d4b62daf936a03197dc7f0bb4cca34cc82c90cbe6986de5a27a73c631fb72bf9b7f44b7f46399ec072efab46da2d94c0789b88e

  • /storage/emulated/0/.msg_device_id.txt

    Filesize

    36B

    MD5

    9ba0e2a51f33828eca9cde29c8e8f45d

    SHA1

    e780d9c5a5de55e33b72a12fccbbd1b6b2429a3d

    SHA256

    8296747faf2cd36acba5e8ce656f45bbd444715c56e87563052f20e4228ebb87

    SHA512

    7860515fa56f2779813720a8db607d90365c2b80114e1b0a27c3021334c6c50e82e813624f939cd4e7dabae2db973971f6e9423828452babf8d42d31c574eb86