General

  • Target

    73e2bbf0662b54c26dc27e9f232f2ccb454990a26334352d6ebfc1292f5a2c43

  • Size

    278KB

  • Sample

    231220-anqt7aefd2

  • MD5

    9a46ba08304e3d1f23492dbcf9efd9e0

  • SHA1

    422a557a804ac566187b7914faa776dffaa3a25b

  • SHA256

    73e2bbf0662b54c26dc27e9f232f2ccb454990a26334352d6ebfc1292f5a2c43

  • SHA512

    8a6452415e532219f052a6c7a52a5ffc905b2cb68c4a251341c36b83d72e3f97d3e86071284bd4724cc1ea75a35558b76499bb3e987d31cd6cdff7878d9ac378

  • SSDEEP

    6144:IBxnf7Ucpzq9R+Bo8/y59tkER/GCzUiyiuguhZNt6E0PxYo:aRc9sC5trzKhZtEP3

Malware Config

Targets

    • Target

      73e2bbf0662b54c26dc27e9f232f2ccb454990a26334352d6ebfc1292f5a2c43

    • Size

      278KB

    • MD5

      9a46ba08304e3d1f23492dbcf9efd9e0

    • SHA1

      422a557a804ac566187b7914faa776dffaa3a25b

    • SHA256

      73e2bbf0662b54c26dc27e9f232f2ccb454990a26334352d6ebfc1292f5a2c43

    • SHA512

      8a6452415e532219f052a6c7a52a5ffc905b2cb68c4a251341c36b83d72e3f97d3e86071284bd4724cc1ea75a35558b76499bb3e987d31cd6cdff7878d9ac378

    • SSDEEP

      6144:IBxnf7Ucpzq9R+Bo8/y59tkER/GCzUiyiuguhZNt6E0PxYo:aRc9sC5trzKhZtEP3

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks