General

  • Target

    8f9a8964b0a79a5dfb3233721017bc688ed7a60cbf5938811ed1af9c07cd01fb

  • Size

    278KB

  • Sample

    231220-jaslascgc2

  • MD5

    8defa94fc2c2ee101e3fdbfa07314e52

  • SHA1

    90a018880732bf252e5c3d3fea5d5a07bda79288

  • SHA256

    8f9a8964b0a79a5dfb3233721017bc688ed7a60cbf5938811ed1af9c07cd01fb

  • SHA512

    8ec529dcd566d2ff54baf08e91cd4e0c5b4f22e045064757208a0345d880a3405b417292ce654635885f9ed67dfea751a8fc536c232834b8da2fc3c2692d6704

  • SSDEEP

    6144:GfSBuPpAmgQKM0hFZzkkjTxdA3gky3lXIpSfOWtzIeaG:GBpPgQsPPdA3gky3vfHtzIeB

Malware Config

Targets

    • Target

      8f9a8964b0a79a5dfb3233721017bc688ed7a60cbf5938811ed1af9c07cd01fb

    • Size

      278KB

    • MD5

      8defa94fc2c2ee101e3fdbfa07314e52

    • SHA1

      90a018880732bf252e5c3d3fea5d5a07bda79288

    • SHA256

      8f9a8964b0a79a5dfb3233721017bc688ed7a60cbf5938811ed1af9c07cd01fb

    • SHA512

      8ec529dcd566d2ff54baf08e91cd4e0c5b4f22e045064757208a0345d880a3405b417292ce654635885f9ed67dfea751a8fc536c232834b8da2fc3c2692d6704

    • SSDEEP

      6144:GfSBuPpAmgQKM0hFZzkkjTxdA3gky3lXIpSfOWtzIeaG:GBpPgQsPPdA3gky3vfHtzIeB

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks