General

  • Target

    0977a7163f725585205533ee51736ae229a5c18a24b026f9777a0c62468f0994.bin

  • Size

    209KB

  • Sample

    230825-1x2wxsfa26

  • MD5

    76acbdf85c53b4925fe77f917054e469

  • SHA1

    957e2b56777ce1390a095be68d2291a53e5bfe52

  • SHA256

    0977a7163f725585205533ee51736ae229a5c18a24b026f9777a0c62468f0994

  • SHA512

    cfcc9f6567f46c31b8e2068a19a9da027e8d68ddb06666abb370720aadaf8898550e763eaf6d4507ac5ceb280a345f0630508d7409d52c2ddcee19f27ddbed30

  • SSDEEP

    6144:m+zQ09r2DVUGPS4igL/op/do/D6nML8ZDNCrYKZ8q+9:U09SGGWcO/QWDNCrk9

Malware Config

Targets

    • Target

      0977a7163f725585205533ee51736ae229a5c18a24b026f9777a0c62468f0994.bin

    • Size

      209KB

    • MD5

      76acbdf85c53b4925fe77f917054e469

    • SHA1

      957e2b56777ce1390a095be68d2291a53e5bfe52

    • SHA256

      0977a7163f725585205533ee51736ae229a5c18a24b026f9777a0c62468f0994

    • SHA512

      cfcc9f6567f46c31b8e2068a19a9da027e8d68ddb06666abb370720aadaf8898550e763eaf6d4507ac5ceb280a345f0630508d7409d52c2ddcee19f27ddbed30

    • SSDEEP

      6144:m+zQ09r2DVUGPS4igL/op/do/D6nML8ZDNCrYKZ8q+9:U09SGGWcO/QWDNCrk9

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks