General

  • Target

    8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce

  • Size

    278KB

  • Sample

    231220-has2dsbaf5

  • MD5

    30eb88d542c825003e64d369b39289fe

  • SHA1

    aaf896efcfdd824a497f322f45f9e4ba311ec8d8

  • SHA256

    8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce

  • SHA512

    5826f5a8d0ad05827147e4265f5ce91f98b696b7e4259f830fa35ffbe5f8d2a53897951faa3b0313c3433c59ba35d0589ac6073b865cd54194b677d84544fcb6

  • SSDEEP

    6144:DysAD8F/GCzUiyiuguhZNt6E0PxYDBxnf7Ucpzq9R+Bo8/y5D:2sA4FrzKhZtEPARc9sC5D

Malware Config

Targets

    • Target

      8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce

    • Size

      278KB

    • MD5

      30eb88d542c825003e64d369b39289fe

    • SHA1

      aaf896efcfdd824a497f322f45f9e4ba311ec8d8

    • SHA256

      8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce

    • SHA512

      5826f5a8d0ad05827147e4265f5ce91f98b696b7e4259f830fa35ffbe5f8d2a53897951faa3b0313c3433c59ba35d0589ac6073b865cd54194b677d84544fcb6

    • SSDEEP

      6144:DysAD8F/GCzUiyiuguhZNt6E0PxYDBxnf7Ucpzq9R+Bo8/y5D:2sA4FrzKhZtEPARc9sC5D

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks