General

  • Target

    7c17c48200159b9c5413c720d4b2c59d13346eeee4dc9350a5ce8b0798ccb3e6

  • Size

    278KB

  • Sample

    231220-cekmxsagb8

  • MD5

    31aac686f5709ac2fb573e2826f0dc25

  • SHA1

    2a9d8d3d91b86fe74befb0266ba1825c582ed16b

  • SHA256

    7c17c48200159b9c5413c720d4b2c59d13346eeee4dc9350a5ce8b0798ccb3e6

  • SHA512

    971f91d06540823e7d731531e040124b23638b81ebef67632747a2fccf90ced5ea67c619e758f46d4601dcde558d34059a8d4e25d0eeaa2509da8083ffe3e2c6

  • SSDEEP

    6144:fMtT4thS+WrqKlRyieeJyUgVqZ83BG5TbaGyJTzvLAoxs:kv+Wrq6yfFUgf4TbaVVXAoa

Malware Config

Targets

    • Target

      7c17c48200159b9c5413c720d4b2c59d13346eeee4dc9350a5ce8b0798ccb3e6

    • Size

      278KB

    • MD5

      31aac686f5709ac2fb573e2826f0dc25

    • SHA1

      2a9d8d3d91b86fe74befb0266ba1825c582ed16b

    • SHA256

      7c17c48200159b9c5413c720d4b2c59d13346eeee4dc9350a5ce8b0798ccb3e6

    • SHA512

      971f91d06540823e7d731531e040124b23638b81ebef67632747a2fccf90ced5ea67c619e758f46d4601dcde558d34059a8d4e25d0eeaa2509da8083ffe3e2c6

    • SSDEEP

      6144:fMtT4thS+WrqKlRyieeJyUgVqZ83BG5TbaGyJTzvLAoxs:kv+Wrq6yfFUgf4TbaVVXAoa

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks