General

  • Target

    89db257220ba57e7f334753268ee9bece46c08d5ae294334b047a834476ea74f

  • Size

    278KB

  • Sample

    231220-gpy1hsaae2

  • MD5

    7250c0debe6ca1589e7362759ea84b6d

  • SHA1

    b5c94cac7892fd6eae43d9638cbd48405eb98c14

  • SHA256

    89db257220ba57e7f334753268ee9bece46c08d5ae294334b047a834476ea74f

  • SHA512

    4299566704f256acb0b8cf45a1239250bbdfc182af2a21093700a42600a0524dc2fec653669018d92ab9b5c3b875d8f2cfb485b6fc04a7491248fc2f622ef359

  • SSDEEP

    6144:QHpSfOWtzIeaTSBuPpAmgQKM0hFZzkkjTxdA3gky3A:QgfHtzIecpPgQsPPdA3gky3A

Malware Config

Targets

    • Target

      89db257220ba57e7f334753268ee9bece46c08d5ae294334b047a834476ea74f

    • Size

      278KB

    • MD5

      7250c0debe6ca1589e7362759ea84b6d

    • SHA1

      b5c94cac7892fd6eae43d9638cbd48405eb98c14

    • SHA256

      89db257220ba57e7f334753268ee9bece46c08d5ae294334b047a834476ea74f

    • SHA512

      4299566704f256acb0b8cf45a1239250bbdfc182af2a21093700a42600a0524dc2fec653669018d92ab9b5c3b875d8f2cfb485b6fc04a7491248fc2f622ef359

    • SSDEEP

      6144:QHpSfOWtzIeaTSBuPpAmgQKM0hFZzkkjTxdA3gky3A:QgfHtzIecpPgQsPPdA3gky3A

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks