General

  • Target

    a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6

  • Size

    390KB

  • Sample

    231220-mn6xmaagbj

  • MD5

    b88c022119aefff00679f6ee55a51f8e

  • SHA1

    51eba7e3d0273a3585b67653ce365a00e7dba325

  • SHA256

    a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6

  • SHA512

    61ee92f81069c0be0144e591008abb5568dfbca66d64fdb52c34e74b3951b01a81bb3ece533364577bd6ec6027f5f868f91e44c8b2d58b89230251b3a9e89623

  • SSDEEP

    12288:tjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4SgoO:tjnb8aXzG38wP5x43oO

Malware Config

Targets

    • Target

      a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6

    • Size

      390KB

    • MD5

      b88c022119aefff00679f6ee55a51f8e

    • SHA1

      51eba7e3d0273a3585b67653ce365a00e7dba325

    • SHA256

      a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6

    • SHA512

      61ee92f81069c0be0144e591008abb5568dfbca66d64fdb52c34e74b3951b01a81bb3ece533364577bd6ec6027f5f868f91e44c8b2d58b89230251b3a9e89623

    • SSDEEP

      12288:tjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4SgoO:tjnb8aXzG38wP5x43oO

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks