General

  • Target

    1e41a9f204ed3bf567eb955f9dae119213cdf4fa3c6dacaa9bb21e95dace021f

  • Size

    484KB

  • Sample

    220207-q55yfacfd7

  • MD5

    4fbc28088b9bf82dcb3bf42fe1fc1f6d

  • SHA1

    c9f9c541920ca07912dd9686700dc86d5d1d2f57

  • SHA256

    1e41a9f204ed3bf567eb955f9dae119213cdf4fa3c6dacaa9bb21e95dace021f

  • SHA512

    53fe6c0229726194a26f76f2b9da54a2a278a394a95e0d6ab1cc5d154a580acffa3db49b1e654d9b67ce897f62de83e59ad5b182edc12923ab0e149e5532f38a

Malware Config

Targets

    • Target

      1e41a9f204ed3bf567eb955f9dae119213cdf4fa3c6dacaa9bb21e95dace021f

    • Size

      484KB

    • MD5

      4fbc28088b9bf82dcb3bf42fe1fc1f6d

    • SHA1

      c9f9c541920ca07912dd9686700dc86d5d1d2f57

    • SHA256

      1e41a9f204ed3bf567eb955f9dae119213cdf4fa3c6dacaa9bb21e95dace021f

    • SHA512

      53fe6c0229726194a26f76f2b9da54a2a278a394a95e0d6ab1cc5d154a580acffa3db49b1e654d9b67ce897f62de83e59ad5b182edc12923ab0e149e5532f38a

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks