General

  • Target

    5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd.bin

  • Size

    283KB

  • Sample

    230825-1y7tkagf9w

  • MD5

    332c27bf469aecb5ccec15d019c23a80

  • SHA1

    e2bc3031376c5f5a4336b5cf177f0116fce847b4

  • SHA256

    5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd

  • SHA512

    4b32724efd0532a4b9e00149a24cba67518c7b3aa96666b9a3e11bf1c506844ac89770d2d18a260fb20282aa965c9c55869cd79734583ab644ddc59be5cfeb23

  • SSDEEP

    6144:vPZaBXwy+eQ1lSsfTx3sB09ptgPU/vvrFUt+d68P65sv/DLE7yVLQ6Y:nZuXwyN4Bd8B0PtgSvRrHP102VU

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.33:28899

DES_key

Targets

    • Target

      5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd.bin

    • Size

      283KB

    • MD5

      332c27bf469aecb5ccec15d019c23a80

    • SHA1

      e2bc3031376c5f5a4336b5cf177f0116fce847b4

    • SHA256

      5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd

    • SHA512

      4b32724efd0532a4b9e00149a24cba67518c7b3aa96666b9a3e11bf1c506844ac89770d2d18a260fb20282aa965c9c55869cd79734583ab644ddc59be5cfeb23

    • SSDEEP

      6144:vPZaBXwy+eQ1lSsfTx3sB09ptgPU/vvrFUt+d68P65sv/DLE7yVLQ6Y:nZuXwyN4Bd8B0PtgSvRrHP102VU

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks