General

  • Target

    a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a

  • Size

    278KB

  • Sample

    231220-mq78gaahgl

  • MD5

    3f3f298c4c16663894b2a6b9b496f043

  • SHA1

    66c7ba1ad03080b261771d1945b2e66161ca7681

  • SHA256

    a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a

  • SHA512

    6329d573c10eb969cfdffe7d654e91001d78133dd398f644b96fc42d9dfbaa352b02980ac8fed2eeca7a40e6dfcbb76b7d8cf5d2cd5e00a2215fd06535e79158

  • SSDEEP

    6144:krpdy8z+WrqKlRyieeJyUgVqZ83BG5d/baGyJTzvLAoxb:krLy8z+Wrq6yfFUgf4VbaVVXAol

Malware Config

Targets

    • Target

      a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a

    • Size

      278KB

    • MD5

      3f3f298c4c16663894b2a6b9b496f043

    • SHA1

      66c7ba1ad03080b261771d1945b2e66161ca7681

    • SHA256

      a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a

    • SHA512

      6329d573c10eb969cfdffe7d654e91001d78133dd398f644b96fc42d9dfbaa352b02980ac8fed2eeca7a40e6dfcbb76b7d8cf5d2cd5e00a2215fd06535e79158

    • SSDEEP

      6144:krpdy8z+WrqKlRyieeJyUgVqZ83BG5d/baGyJTzvLAoxb:krLy8z+Wrq6yfFUgf4VbaVVXAol

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks