General

  • Target

    8706af3e18a6d612e26cc3cd6d8c733aed0f9130a9c19cca1fd3939539711809

  • Size

    255KB

  • Sample

    231220-f1n41sgef6

  • MD5

    e491b6eaf945d3d3884b9bdcdc20286d

  • SHA1

    f189bda8b07b1f8e9b3b89a484ce2aff2d110c8f

  • SHA256

    8706af3e18a6d612e26cc3cd6d8c733aed0f9130a9c19cca1fd3939539711809

  • SHA512

    b49e0ecb998691f3f4690c4d3e950a9120797e36b76a9f8a42a8cdf666d79142633ad7ac8def61225e94b2fdfe00cbeeae24d127f4fa5752359f335bb691323d

  • SSDEEP

    6144:iygy9ad/EusQJqBPoi/V1DcFGYrAIK980QM/bkmmP:iv/EusQJ0L/QF18QMIr

Malware Config

Targets

    • Target

      8706af3e18a6d612e26cc3cd6d8c733aed0f9130a9c19cca1fd3939539711809

    • Size

      255KB

    • MD5

      e491b6eaf945d3d3884b9bdcdc20286d

    • SHA1

      f189bda8b07b1f8e9b3b89a484ce2aff2d110c8f

    • SHA256

      8706af3e18a6d612e26cc3cd6d8c733aed0f9130a9c19cca1fd3939539711809

    • SHA512

      b49e0ecb998691f3f4690c4d3e950a9120797e36b76a9f8a42a8cdf666d79142633ad7ac8def61225e94b2fdfe00cbeeae24d127f4fa5752359f335bb691323d

    • SSDEEP

      6144:iygy9ad/EusQJqBPoi/V1DcFGYrAIK980QM/bkmmP:iv/EusQJ0L/QF18QMIr

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks