General

  • Target

    iJjTgLzYsFgDrRy.apk

  • Size

    218KB

  • Sample

    201122-rq558bfw7a

  • MD5

    bfa8485aba16ecca0ad2504f27ff46b5

  • SHA1

    a7e7a0d42d7e5635e803c0f913565fc93e714ebc

  • SHA256

    5c3126752ea0c6d395b2c73ddb75e20c7719feb685b8082cbc00ff41665013f3

  • SHA512

    6672533bd45e578000cbbbfbe97027e33990f09446a67e9960bd4c2788862aa8af810d54270d617508a8fcb09f32694524818fa60524492abb96271b29b5fd1e

Malware Config

Extracted

DES_key

Targets

    • Target

      iJjTgLzYsFgDrRy.apk

    • Size

      218KB

    • MD5

      bfa8485aba16ecca0ad2504f27ff46b5

    • SHA1

      a7e7a0d42d7e5635e803c0f913565fc93e714ebc

    • SHA256

      5c3126752ea0c6d395b2c73ddb75e20c7719feb685b8082cbc00ff41665013f3

    • SHA512

      6672533bd45e578000cbbbfbe97027e33990f09446a67e9960bd4c2788862aa8af810d54270d617508a8fcb09f32694524818fa60524492abb96271b29b5fd1e

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks