General

  • Target

    939e9e2cb8fc26eddb9d44fb1dffa56894dbf56d9e646853f93008032a240d41

  • Size

    278KB

  • Sample

    231220-j5k5pseec2

  • MD5

    b8f71cd3d6aa84952289801e1097bbb9

  • SHA1

    e1abe79836e3dce4266e0b47833514659a4b5fac

  • SHA256

    939e9e2cb8fc26eddb9d44fb1dffa56894dbf56d9e646853f93008032a240d41

  • SHA512

    d33701afb04a00b26f7653143770f6f324de23f32f4eba8da24f0605fc513b64dfe1a0ad9e6dd1de2839e88c5d6fd663a8f0e29c1463843ac1c796cba3290bc8

  • SSDEEP

    6144:MjKGsmmULSv0tpNpaBq98iEeCfGTWr4ADDcdSk+cpzqjR+Bo8/y5+u:UKvULptjAqenFfGScQDcdSkyjsC5+u

Malware Config

Targets

    • Target

      939e9e2cb8fc26eddb9d44fb1dffa56894dbf56d9e646853f93008032a240d41

    • Size

      278KB

    • MD5

      b8f71cd3d6aa84952289801e1097bbb9

    • SHA1

      e1abe79836e3dce4266e0b47833514659a4b5fac

    • SHA256

      939e9e2cb8fc26eddb9d44fb1dffa56894dbf56d9e646853f93008032a240d41

    • SHA512

      d33701afb04a00b26f7653143770f6f324de23f32f4eba8da24f0605fc513b64dfe1a0ad9e6dd1de2839e88c5d6fd663a8f0e29c1463843ac1c796cba3290bc8

    • SSDEEP

      6144:MjKGsmmULSv0tpNpaBq98iEeCfGTWr4ADDcdSk+cpzqjR+Bo8/y5+u:UKvULptjAqenFfGScQDcdSkyjsC5+u

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks