General

  • Target

    7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d

  • Size

    278KB

  • Sample

    231220-bg171sgff4

  • MD5

    c04f0c527baa1aaf8d862af14f297430

  • SHA1

    e8a39a26bc7530db2a01a8c93937105a526828b9

  • SHA256

    7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d

  • SHA512

    4af8c4b6e63a2d2e7e1b2494d6893c558fab5bfa0e2de8f44dfcf1d050fd2d77e7828dd6f3044cdc5366146e6b509d2b5a98efd14b2247f372f5c4dc4710d649

  • SSDEEP

    6144:6tkER/GCzUiyiuguhZNt6E0PxYhBxnf7Ucpzq9R+Bo8/y5x:ErzKhZtEP8Rc9sC5x

Malware Config

Targets

    • Target

      7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d

    • Size

      278KB

    • MD5

      c04f0c527baa1aaf8d862af14f297430

    • SHA1

      e8a39a26bc7530db2a01a8c93937105a526828b9

    • SHA256

      7763a6c41f266afa3e93399fa3ff5cfbb46c2342afa87c92ef746bc9ece6154d

    • SHA512

      4af8c4b6e63a2d2e7e1b2494d6893c558fab5bfa0e2de8f44dfcf1d050fd2d77e7828dd6f3044cdc5366146e6b509d2b5a98efd14b2247f372f5c4dc4710d649

    • SSDEEP

      6144:6tkER/GCzUiyiuguhZNt6E0PxYhBxnf7Ucpzq9R+Bo8/y5x:ErzKhZtEP8Rc9sC5x

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks