General

  • Target

    9cb137ed6b8c66d20ea9a0b07749dff644eda38280fe25efe70257fbae2edc30

  • Size

    278KB

  • Sample

    231220-le61lafcgm

  • MD5

    1977a4702d1fd5f3ba6ff64ca950fb43

  • SHA1

    3cd1c8141031dfbb82d32c84a2e96b864825c349

  • SHA256

    9cb137ed6b8c66d20ea9a0b07749dff644eda38280fe25efe70257fbae2edc30

  • SHA512

    965fa40f259c41289567bed4736fc668afc1a785e6973a04619c8b74a6ee17601a52240e2ca0a72e085a9bbf15b1fd391807774d5a344b4dc1a823d90b4e261e

  • SSDEEP

    6144:ogMKGsmmULSv0tpNpaBq98iEeCfGTWr4ADDcOSk+cpzqjR+Bo8/y5+i:kKvULptjAqenFfGScQDcOSkyjsC5+i

Malware Config

Targets

    • Target

      9cb137ed6b8c66d20ea9a0b07749dff644eda38280fe25efe70257fbae2edc30

    • Size

      278KB

    • MD5

      1977a4702d1fd5f3ba6ff64ca950fb43

    • SHA1

      3cd1c8141031dfbb82d32c84a2e96b864825c349

    • SHA256

      9cb137ed6b8c66d20ea9a0b07749dff644eda38280fe25efe70257fbae2edc30

    • SHA512

      965fa40f259c41289567bed4736fc668afc1a785e6973a04619c8b74a6ee17601a52240e2ca0a72e085a9bbf15b1fd391807774d5a344b4dc1a823d90b4e261e

    • SSDEEP

      6144:ogMKGsmmULSv0tpNpaBq98iEeCfGTWr4ADDcOSk+cpzqjR+Bo8/y5+i:kKvULptjAqenFfGScQDcOSkyjsC5+i

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks