General

  • Target

    8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169

  • Size

    278KB

  • Sample

    231220-hbmwrsfhaj

  • MD5

    ad8f13c15bf702a1f22f00bd19a8a9b7

  • SHA1

    c42436fc74ec5cf9749aef23c741e87077cc84fa

  • SHA256

    8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169

  • SHA512

    8d37996c87e3f9a0cc12822b4878f439dfcd3c65114c99ef85442ddb45b3a368e35fbf1218a490356421adba03cd76d848a90832e002e30d5e8adf1f9c889022

  • SSDEEP

    6144:lKe/GCzUiyiuguhZNt6E0PxYTvBxnf7Ucpzq9R+Bo8/y5c:3rzKhZtEPS5Rc9sC5c

Malware Config

Targets

    • Target

      8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169

    • Size

      278KB

    • MD5

      ad8f13c15bf702a1f22f00bd19a8a9b7

    • SHA1

      c42436fc74ec5cf9749aef23c741e87077cc84fa

    • SHA256

      8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169

    • SHA512

      8d37996c87e3f9a0cc12822b4878f439dfcd3c65114c99ef85442ddb45b3a368e35fbf1218a490356421adba03cd76d848a90832e002e30d5e8adf1f9c889022

    • SSDEEP

      6144:lKe/GCzUiyiuguhZNt6E0PxYTvBxnf7Ucpzq9R+Bo8/y5c:3rzKhZtEPS5Rc9sC5c

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks