General

  • Target

    871b9c6ca4cc3ae8e1e969cc50c0f4880bd9d142af8cd75108f1444d662e3706

  • Size

    278KB

  • Sample

    231220-f2w61sgfb4

  • MD5

    83fc6c31428c7d6205bc932c36d6e8df

  • SHA1

    2426f4ea284df04e86c154ff1a8647845e062f09

  • SHA256

    871b9c6ca4cc3ae8e1e969cc50c0f4880bd9d142af8cd75108f1444d662e3706

  • SHA512

    8d721e32931198ce01fd10fcac1096c4586299773ded32dbca364c8b5c802c493ab2d787da783b106dfd2b90e0d71893feffa96d6b6ff92987476f0f2c7e5020

  • SSDEEP

    6144:Raa3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaQ10xTem70W:BDcbqSCbi4oDGgjuGVC+se20W

Malware Config

Targets

    • Target

      871b9c6ca4cc3ae8e1e969cc50c0f4880bd9d142af8cd75108f1444d662e3706

    • Size

      278KB

    • MD5

      83fc6c31428c7d6205bc932c36d6e8df

    • SHA1

      2426f4ea284df04e86c154ff1a8647845e062f09

    • SHA256

      871b9c6ca4cc3ae8e1e969cc50c0f4880bd9d142af8cd75108f1444d662e3706

    • SHA512

      8d721e32931198ce01fd10fcac1096c4586299773ded32dbca364c8b5c802c493ab2d787da783b106dfd2b90e0d71893feffa96d6b6ff92987476f0f2c7e5020

    • SSDEEP

      6144:Raa3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaQ10xTem70W:BDcbqSCbi4oDGgjuGVC+se20W

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks