General

  • Target

    iHgLcHoBlFtG.apk

  • Size

    218KB

  • Sample

    201123-hse2jbr4ae

  • MD5

    af3565659399767250b6a92d7588a6c6

  • SHA1

    6606e69a3d07ade51066f22d98e19ce6ab59b1d2

  • SHA256

    c24c3c7ab8706e65afa88599e293632f47d34415a5b13447a2f3ced09f8a903a

  • SHA512

    b0daeb707f954a5c066be333480abe35e845ade9f22c7cd6d25ebd8482ecd53bf4c31a050c0c40a7139bcae07bdbc051b0b36854e148500105029f5401aa07b4

Malware Config

Extracted

DES_key

Targets

    • Target

      iHgLcHoBlFtG.apk

    • Size

      218KB

    • MD5

      af3565659399767250b6a92d7588a6c6

    • SHA1

      6606e69a3d07ade51066f22d98e19ce6ab59b1d2

    • SHA256

      c24c3c7ab8706e65afa88599e293632f47d34415a5b13447a2f3ced09f8a903a

    • SHA512

      b0daeb707f954a5c066be333480abe35e845ade9f22c7cd6d25ebd8482ecd53bf4c31a050c0c40a7139bcae07bdbc051b0b36854e148500105029f5401aa07b4

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks