General

  • Target

    7769290e4d0e5aaa99f8934ab6ae4f71dc72d2b2fb18e85c2018e638c5a80733

  • Size

    278KB

  • Sample

    231220-bhyhhsgga4

  • MD5

    cc1055b308056d0c1dc142d7f802aa1a

  • SHA1

    daee6d34560f156c94a15cd0f6bb61b8d42d4d56

  • SHA256

    7769290e4d0e5aaa99f8934ab6ae4f71dc72d2b2fb18e85c2018e638c5a80733

  • SHA512

    c8261cf92deae5e17b3e395fa26c1080e83c0b7ceb46c2061a63f4700987e0f527df44d3b4fdb5ab73893b27f6d9a71490c071e274c7159478dd49923ae716d0

  • SSDEEP

    6144:u3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIai110xTem704:CDcbqSCbi4oDGgjuGVCivse204

Malware Config

Targets

    • Target

      7769290e4d0e5aaa99f8934ab6ae4f71dc72d2b2fb18e85c2018e638c5a80733

    • Size

      278KB

    • MD5

      cc1055b308056d0c1dc142d7f802aa1a

    • SHA1

      daee6d34560f156c94a15cd0f6bb61b8d42d4d56

    • SHA256

      7769290e4d0e5aaa99f8934ab6ae4f71dc72d2b2fb18e85c2018e638c5a80733

    • SHA512

      c8261cf92deae5e17b3e395fa26c1080e83c0b7ceb46c2061a63f4700987e0f527df44d3b4fdb5ab73893b27f6d9a71490c071e274c7159478dd49923ae716d0

    • SSDEEP

      6144:u3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIai110xTem704:CDcbqSCbi4oDGgjuGVCivse204

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks