General

  • Target

    kuronekoyamato.apk

  • Size

    444KB

  • Sample

    211015-hl8afsafc7

  • MD5

    be19ba6e627b0cb5a1e4acb7c725a240

  • SHA1

    5f4b437ce703ad85ec0d52a83a8f96c2f9491c29

  • SHA256

    dc2c8a143099b03f2de31b05cf02a7dc68e88b330c8f5a7f9536c69963293380

  • SHA512

    89b376176d63554c620fc42195cd03dbdcf371351fde90bf4ccfb6f2362373d8cf283190b67b0d3e8f3fb1604955749f779ba8fd47473f23b8e81bccd82ba663

Malware Config

Targets

    • Target

      kuronekoyamato.apk

    • Size

      444KB

    • MD5

      be19ba6e627b0cb5a1e4acb7c725a240

    • SHA1

      5f4b437ce703ad85ec0d52a83a8f96c2f9491c29

    • SHA256

      dc2c8a143099b03f2de31b05cf02a7dc68e88b330c8f5a7f9536c69963293380

    • SHA512

      89b376176d63554c620fc42195cd03dbdcf371351fde90bf4ccfb6f2362373d8cf283190b67b0d3e8f3fb1604955749f779ba8fd47473f23b8e81bccd82ba663

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks