General

  • Target

    80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133

  • Size

    278KB

  • Sample

    231220-d137tsabfp

  • MD5

    2c15060d0d2afc6a640a6c2d90861276

  • SHA1

    91ac7f43750fddec6e971c28fcff7a749d719702

  • SHA256

    80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133

  • SHA512

    efacf84dd7b59fa0a48f59108e8142d652ce70363c7629c84bf48ecdb360f6a6a477407c509ac49172d5f28458d90cea7cb7fb6fa79a0d5123999471eb4151f7

  • SSDEEP

    6144:K10xTem70N3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaV:Mse201DcbqSCbi4oDGgjuGVCV

Malware Config

Targets

    • Target

      80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133

    • Size

      278KB

    • MD5

      2c15060d0d2afc6a640a6c2d90861276

    • SHA1

      91ac7f43750fddec6e971c28fcff7a749d719702

    • SHA256

      80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133

    • SHA512

      efacf84dd7b59fa0a48f59108e8142d652ce70363c7629c84bf48ecdb360f6a6a477407c509ac49172d5f28458d90cea7cb7fb6fa79a0d5123999471eb4151f7

    • SSDEEP

      6144:K10xTem70N3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaV:Mse201DcbqSCbi4oDGgjuGVCV

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks