General

  • Target

    7b7572dfb35a4628288ac7526769f461323a60eec72a963c93f7be9423afeb28

  • Size

    278KB

  • Sample

    231220-b9tnmsfchm

  • MD5

    82d4abd36e9055dfe4ea8135b9e1aaa3

  • SHA1

    08e10658f71a77e84aef88c4db6935d628e18c11

  • SHA256

    7b7572dfb35a4628288ac7526769f461323a60eec72a963c93f7be9423afeb28

  • SHA512

    cec0482ebfb4aa2de41984485975e2dea9edc23029bf7cd3149613e0a62aecfb74d823219c18b5f63dcbfcf1bd9389eab17930f2925b848bf1eb5afd83c759c5

  • SSDEEP

    6144:F6E/1/GCzUiyiuguhZNt6E0PxYVmBxnf7Ucpzq9R+Bo8/y5S:ou1rzKhZtEPfRc9sC5S

Malware Config

Targets

    • Target

      7b7572dfb35a4628288ac7526769f461323a60eec72a963c93f7be9423afeb28

    • Size

      278KB

    • MD5

      82d4abd36e9055dfe4ea8135b9e1aaa3

    • SHA1

      08e10658f71a77e84aef88c4db6935d628e18c11

    • SHA256

      7b7572dfb35a4628288ac7526769f461323a60eec72a963c93f7be9423afeb28

    • SHA512

      cec0482ebfb4aa2de41984485975e2dea9edc23029bf7cd3149613e0a62aecfb74d823219c18b5f63dcbfcf1bd9389eab17930f2925b848bf1eb5afd83c759c5

    • SSDEEP

      6144:F6E/1/GCzUiyiuguhZNt6E0PxYVmBxnf7Ucpzq9R+Bo8/y5S:ou1rzKhZtEPfRc9sC5S

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks