General

  • Target

    762831f88590e4774c20cfa8992fecaeaed81921a86ed2ce12d7b48962fd3085

  • Size

    278KB

  • Sample

    231220-a652tsgab8

  • MD5

    40847e86c7be08d7e4191472a5fde683

  • SHA1

    445cb49c765e845833621c537c643a7ebe3359b6

  • SHA256

    762831f88590e4774c20cfa8992fecaeaed81921a86ed2ce12d7b48962fd3085

  • SHA512

    0576e77ffdc59a8105a4ce7fb3bc31afc289286c698f1cf119916dabf4600e1819427718c2a81c6b9322f19d3ab01d1338c5dac73f9f9f2b5a4b428ef4233b47

  • SSDEEP

    6144:BQc0Y+xSNP+WrqKlRyieeJyUgVqZ83BG5pbaGyJTzvLAoxD:W+NP+Wrq6yfFUgf4pbaVVXAoF

Malware Config

Targets

    • Target

      762831f88590e4774c20cfa8992fecaeaed81921a86ed2ce12d7b48962fd3085

    • Size

      278KB

    • MD5

      40847e86c7be08d7e4191472a5fde683

    • SHA1

      445cb49c765e845833621c537c643a7ebe3359b6

    • SHA256

      762831f88590e4774c20cfa8992fecaeaed81921a86ed2ce12d7b48962fd3085

    • SHA512

      0576e77ffdc59a8105a4ce7fb3bc31afc289286c698f1cf119916dabf4600e1819427718c2a81c6b9322f19d3ab01d1338c5dac73f9f9f2b5a4b428ef4233b47

    • SSDEEP

      6144:BQc0Y+xSNP+WrqKlRyieeJyUgVqZ83BG5pbaGyJTzvLAoxD:W+NP+Wrq6yfFUgf4pbaVVXAoF

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks