General

  • Target

    ca71c7c47401e2496130b314f981dbac31010c03615b8d385fed926d809cec75

  • Size

    306KB

  • Sample

    220521-xdwc9aeggr

  • MD5

    880682059f8ed4181cfc8020cf955a84

  • SHA1

    79ec52367501676ac2b8ade32224e68b8e7b458c

  • SHA256

    ca71c7c47401e2496130b314f981dbac31010c03615b8d385fed926d809cec75

  • SHA512

    1277f574d39c55323faa25e85f0317e09ff54a894afcab3f1033497a32441ce89c0f5ced16e330f1cc8a448a4c1ccdb665bc0d9b323d47669c464614f81ecc78

Malware Config

Targets

    • Target

      ca71c7c47401e2496130b314f981dbac31010c03615b8d385fed926d809cec75

    • Size

      306KB

    • MD5

      880682059f8ed4181cfc8020cf955a84

    • SHA1

      79ec52367501676ac2b8ade32224e68b8e7b458c

    • SHA256

      ca71c7c47401e2496130b314f981dbac31010c03615b8d385fed926d809cec75

    • SHA512

      1277f574d39c55323faa25e85f0317e09ff54a894afcab3f1033497a32441ce89c0f5ced16e330f1cc8a448a4c1ccdb665bc0d9b323d47669c464614f81ecc78

    • XLoader Payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks