Resubmissions

11-03-2021 15:08

210311-bfcvhk2we2 10

07-12-2020 07:26

201207-xrcftba5rx 10

General

  • Target

    dAdYrNg.apk

  • Size

    218KB

  • Sample

    210311-bfcvhk2we2

  • MD5

    cce6059446540919706260279c204608

  • SHA1

    8aa0055a0d8c782204dbaccfc99545d2eb89d67d

  • SHA256

    7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d

  • SHA512

    b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d

Malware Config

Extracted

DES_key

Targets

    • Target

      dAdYrNg.apk

    • Size

      218KB

    • MD5

      cce6059446540919706260279c204608

    • SHA1

      8aa0055a0d8c782204dbaccfc99545d2eb89d67d

    • SHA256

      7d4d00a1ed508db997d98bc9bda0e9ed4e5115f5898b93f71ced5a1a92e44b6d

    • SHA512

      b31dc057d12d5df5849f24ac00483529477b0e7beda1e43ff066798e42e7a33b28b5aed30073d184cbbdc9b6c839ca1de8000d49f4a7c9edf1c0a55eafde2e7d

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks