General

  • Target

    896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199

  • Size

    278KB

  • Sample

    231220-glgxtshha5

  • MD5

    1d21fa0ced2a9036abd1aba44a812c89

  • SHA1

    312c7ae429d0ae92d97fd5fec39db11414b56a09

  • SHA256

    896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199

  • SHA512

    e5aa6e738f10ba5b67ee4b7c29d8ee81db1446e25b3e5370eb395b9f37b60ce1be478ee8f205577363deed68484d9148f57f0efa883331ffbf8257940ae7f97f

  • SSDEEP

    6144:9e/GCzUiyiuguhZNt6E0PxYaBxnf7Ucpzq9R+Bo8/y5N:krzKhZtEPJRc9sC5N

Malware Config

Targets

    • Target

      896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199

    • Size

      278KB

    • MD5

      1d21fa0ced2a9036abd1aba44a812c89

    • SHA1

      312c7ae429d0ae92d97fd5fec39db11414b56a09

    • SHA256

      896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199

    • SHA512

      e5aa6e738f10ba5b67ee4b7c29d8ee81db1446e25b3e5370eb395b9f37b60ce1be478ee8f205577363deed68484d9148f57f0efa883331ffbf8257940ae7f97f

    • SSDEEP

      6144:9e/GCzUiyiuguhZNt6E0PxYaBxnf7Ucpzq9R+Bo8/y5N:krzKhZtEPJRc9sC5N

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks