General

  • Target

    796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead

  • Size

    278KB

  • Sample

    231220-b1yagaegdj

  • MD5

    ca75256d56688522111ff67122e47944

  • SHA1

    f99722c9068dabba3da8929adf911e4d7193a275

  • SHA256

    796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead

  • SHA512

    150d5d7d6cd4ccdb1ac5c00c1ced42b810d69090f527df0c432eb2f9c340845cda8db1a566ec6cc6ca6833bacde0300586a8baaec2f8e663b52f0d2070d469e0

  • SSDEEP

    6144:EV86ZexSNP+WrqKlRyieeJyUgVqZ83BG5PyKbaGyJTzvLAox3:r6ZfNP+Wrq6yfFUgf4PyKbaVVXAoF

Malware Config

Targets

    • Target

      796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead

    • Size

      278KB

    • MD5

      ca75256d56688522111ff67122e47944

    • SHA1

      f99722c9068dabba3da8929adf911e4d7193a275

    • SHA256

      796fd2aca1dca3d9d50de65bd4df5361fe1d871995a1018e3c925c6fe764dead

    • SHA512

      150d5d7d6cd4ccdb1ac5c00c1ced42b810d69090f527df0c432eb2f9c340845cda8db1a566ec6cc6ca6833bacde0300586a8baaec2f8e663b52f0d2070d469e0

    • SSDEEP

      6144:EV86ZexSNP+WrqKlRyieeJyUgVqZ83BG5PyKbaGyJTzvLAox3:r6ZfNP+Wrq6yfFUgf4PyKbaVVXAoF

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks