dAdYrNg.apk

General
Target

dAdYrNg.apk

Size

218KB

Sample

201207-xrcftba5rx

Score
10 /10
MD5

cce6059446540919706260279c204608

SHA1

8aa0055a0d8c782204dbaccfc99545d2eb89d67d

SHA256

7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d

SHA512

b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d

Malware Config

Extracted

DES_key
Targets
Target

dAdYrNg.apk

MD5

cce6059446540919706260279c204608

Filesize

218KB

Score
10 /10
SHA1

8aa0055a0d8c782204dbaccfc99545d2eb89d67d

SHA256

7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d

SHA512

b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d

Tags

Signatures

  • XLoader, MoqHao

    Description

    An Android banker and info stealer.

    Tags

  • Removes its main activity from the application launcher

  • Loads dropped Dex/Jar

    Description

    Runs executable file dropped to the device during analysis.

  • Reads name of network operator

    Description

    Uses Android APIs to discover system information.

  • Uses Crypto APIs (Might try to encrypt user data).

    Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation