General

  • Target

    9f4064180bad0f131d41f97872f6687983d1b451d879ea29ee0ba9f3b5906df8

  • Size

    278KB

  • Sample

    231220-ly9wlagfan

  • MD5

    dd4febf7145d44ca5eb45a20f6e917c2

  • SHA1

    10727df06eaca89b8f9c00c4ea7f9a7a74576129

  • SHA256

    9f4064180bad0f131d41f97872f6687983d1b451d879ea29ee0ba9f3b5906df8

  • SHA512

    6946123aefa857cc3316f8fe4a536931765f0dd5d699d488ff639691af883d219f82d124d397ea989437c35cf89c45ef328f7957ffeb6ee39cbf71161f88e009

  • SSDEEP

    6144:Zdy8z+WrqKlRyieeJyUgVqZ83BG51baGyJTzvLAoxa:by8z+Wrq6yfFUgf41baVVXAoA

Malware Config

Targets

    • Target

      9f4064180bad0f131d41f97872f6687983d1b451d879ea29ee0ba9f3b5906df8

    • Size

      278KB

    • MD5

      dd4febf7145d44ca5eb45a20f6e917c2

    • SHA1

      10727df06eaca89b8f9c00c4ea7f9a7a74576129

    • SHA256

      9f4064180bad0f131d41f97872f6687983d1b451d879ea29ee0ba9f3b5906df8

    • SHA512

      6946123aefa857cc3316f8fe4a536931765f0dd5d699d488ff639691af883d219f82d124d397ea989437c35cf89c45ef328f7957ffeb6ee39cbf71161f88e009

    • SSDEEP

      6144:Zdy8z+WrqKlRyieeJyUgVqZ83BG51baGyJTzvLAoxa:by8z+Wrq6yfFUgf41baVVXAoA

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks