General

  • Target

    kuronekoyamato.apk

  • Size

    444KB

  • Sample

    211015-hz21labdbr

  • MD5

    a7e1a12eb27b3ee2209dffa1a59f58c8

  • SHA1

    bff82146d55983003e8da6b77a5bd8eee898ed72

  • SHA256

    c92a7d2f90ed8bdc73a7ed3fef7bb98cc86b875a939c2b5d2b01ca6db71f98d8

  • SHA512

    bdbbfbcb8a2744066026f0718bdb961a22f6e86b52cfb9e34368bfc7b95e3f07e4755e860c82f1a743223b82b1743c23ed6693f5ef3553f2955bbe270284f1f2

Malware Config

Targets

    • Target

      kuronekoyamato.apk

    • Size

      444KB

    • MD5

      a7e1a12eb27b3ee2209dffa1a59f58c8

    • SHA1

      bff82146d55983003e8da6b77a5bd8eee898ed72

    • SHA256

      c92a7d2f90ed8bdc73a7ed3fef7bb98cc86b875a939c2b5d2b01ca6db71f98d8

    • SHA512

      bdbbfbcb8a2744066026f0718bdb961a22f6e86b52cfb9e34368bfc7b95e3f07e4755e860c82f1a743223b82b1743c23ed6693f5ef3553f2955bbe270284f1f2

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks