General

  • Target

    kuronekoyamato.apk

  • Size

    444KB

  • Sample

    211015-h287pabdcn

  • MD5

    d3cca23661c1dbed873738b5b3139c17

  • SHA1

    b898615a181e439b4a70bafa751a9161fc23b6fc

  • SHA256

    7ddb396891451029c2974391c477e943b373eb78f0f5ac56a80e1e887913a65b

  • SHA512

    62d3694d91be6bf4f4e7c3746c06cf39ae1eb70f78b693fb096b4ee7fb2f74ddba03738f9e23b09dd080fa87fc4a0076be98526025550c2a2d113642e11ac67e

Malware Config

Targets

    • Target

      kuronekoyamato.apk

    • Size

      444KB

    • MD5

      d3cca23661c1dbed873738b5b3139c17

    • SHA1

      b898615a181e439b4a70bafa751a9161fc23b6fc

    • SHA256

      7ddb396891451029c2974391c477e943b373eb78f0f5ac56a80e1e887913a65b

    • SHA512

      62d3694d91be6bf4f4e7c3746c06cf39ae1eb70f78b693fb096b4ee7fb2f74ddba03738f9e23b09dd080fa87fc4a0076be98526025550c2a2d113642e11ac67e

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks