General

  • Target

    7f581e27ac84cc75cc5bdcbdc4aa711ec2daf7afc5f7374cd48795191dcf48f2

  • Size

    278KB

  • Sample

    231220-dfct5scdf4

  • MD5

    900d51bb9da577a2ee3c3a79c822f029

  • SHA1

    e9b32d32ded350a4f274a5cfc8d4ffe9f207dbb9

  • SHA256

    7f581e27ac84cc75cc5bdcbdc4aa711ec2daf7afc5f7374cd48795191dcf48f2

  • SHA512

    9a3a57eae685ef34d969661ca90596406287580cc3d6ec5979fc7b74528cfff1e302fcb138af0aad91b5428321484cefa161c9ea3c48646c0b2d8ead4ac29a3f

  • SSDEEP

    6144:2l/dy8z+WrqKlRyieeJyUgVqZ83BG52baGyJTzvLAoxj:Oy8z+Wrq6yfFUgf42baVVXAoB

Malware Config

Targets

    • Target

      7f581e27ac84cc75cc5bdcbdc4aa711ec2daf7afc5f7374cd48795191dcf48f2

    • Size

      278KB

    • MD5

      900d51bb9da577a2ee3c3a79c822f029

    • SHA1

      e9b32d32ded350a4f274a5cfc8d4ffe9f207dbb9

    • SHA256

      7f581e27ac84cc75cc5bdcbdc4aa711ec2daf7afc5f7374cd48795191dcf48f2

    • SHA512

      9a3a57eae685ef34d969661ca90596406287580cc3d6ec5979fc7b74528cfff1e302fcb138af0aad91b5428321484cefa161c9ea3c48646c0b2d8ead4ac29a3f

    • SSDEEP

      6144:2l/dy8z+WrqKlRyieeJyUgVqZ83BG52baGyJTzvLAoxj:Oy8z+Wrq6yfFUgf42baVVXAoB

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks