General

  • Target

    9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5

  • Size

    278KB

  • Sample

    231220-l49ssaghgk

  • MD5

    b0596c7bdf10eeccdfbdee5b30d4a0d6

  • SHA1

    95c6bf0c90bac6c3de30bc63c15146181ffdf1a4

  • SHA256

    9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5

  • SHA512

    ccb8c18f39e2a513a2790f1f26dcb3da4f6a51704405940aac4af2a53ee1281e710cbdbe0a2f985f917a4d652f64b17a1491d2108015016f3c05d9d7d5fd19ed

  • SSDEEP

    6144:f86ZexSNP+WrqKlRyieeJyUgVqZ83BG5TSbaGyJTzvLAoxM:U6ZfNP+Wrq6yfFUgf42baVVXAom

Malware Config

Targets

    • Target

      9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5

    • Size

      278KB

    • MD5

      b0596c7bdf10eeccdfbdee5b30d4a0d6

    • SHA1

      95c6bf0c90bac6c3de30bc63c15146181ffdf1a4

    • SHA256

      9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5

    • SHA512

      ccb8c18f39e2a513a2790f1f26dcb3da4f6a51704405940aac4af2a53ee1281e710cbdbe0a2f985f917a4d652f64b17a1491d2108015016f3c05d9d7d5fd19ed

    • SSDEEP

      6144:f86ZexSNP+WrqKlRyieeJyUgVqZ83BG5TSbaGyJTzvLAoxM:U6ZfNP+Wrq6yfFUgf42baVVXAom

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks