General

  • Target

    uYtBwZuWpNbLfRy.apk

  • Size

    217KB

  • Sample

    201204-rw4v8lyden

  • MD5

    730422686f97a0d2683f8ada6e115f44

  • SHA1

    2df5a30151fd26b7643579717c2b38f7dcfe7457

  • SHA256

    4a81fc9f327245252f3ac0ca61143ec8038a61494d78384592af2c8e899719f8

  • SHA512

    48d079e297e542d6eb203622ea893533740f24943ee6dafe04d1c24eea542adfffe8e5c0b2ca5510daafc5bb696fa035ff4f5cc9dff73c3c0c4c3cd0b6a58a67

Malware Config

Extracted

DES_key

Targets

    • Target

      uYtBwZuWpNbLfRy.apk

    • Size

      217KB

    • MD5

      730422686f97a0d2683f8ada6e115f44

    • SHA1

      2df5a30151fd26b7643579717c2b38f7dcfe7457

    • SHA256

      4a81fc9f327245252f3ac0ca61143ec8038a61494d78384592af2c8e899719f8

    • SHA512

      48d079e297e542d6eb203622ea893533740f24943ee6dafe04d1c24eea542adfffe8e5c0b2ca5510daafc5bb696fa035ff4f5cc9dff73c3c0c4c3cd0b6a58a67

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads name of network operator

      Uses Android APIs to discover system information.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks