General

  • Target

    7b5845094b033826401cfb2bfe1b204448b70663d55bacefeedabea97fad03d7

  • Size

    306KB

  • Sample

    220521-emlw3ahec9

  • MD5

    55d1e5c4fb50aad19afcff2470f288bf

  • SHA1

    61b630699369abe9d3bd8b7b7f4093831c500c62

  • SHA256

    7b5845094b033826401cfb2bfe1b204448b70663d55bacefeedabea97fad03d7

  • SHA512

    5f2f20ffc6a986b61bb070bb492d283c44c9babd7c578914ee24a838cb12ac8e51111ef029ef0ff0021c99b5088f33f70ceb257833c91ceba9598c336018637c

Malware Config

Targets

    • Target

      7b5845094b033826401cfb2bfe1b204448b70663d55bacefeedabea97fad03d7

    • Size

      306KB

    • MD5

      55d1e5c4fb50aad19afcff2470f288bf

    • SHA1

      61b630699369abe9d3bd8b7b7f4093831c500c62

    • SHA256

      7b5845094b033826401cfb2bfe1b204448b70663d55bacefeedabea97fad03d7

    • SHA512

      5f2f20ffc6a986b61bb070bb492d283c44c9babd7c578914ee24a838cb12ac8e51111ef029ef0ff0021c99b5088f33f70ceb257833c91ceba9598c336018637c

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks