General

  • Target

    a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8

  • Size

    278KB

  • Sample

    231220-mra95aecb5

  • MD5

    76b4490b1ea89fb776f075d96369d70b

  • SHA1

    d7a82954b1501dfbf0120eb5a60e61ead3096ab1

  • SHA256

    a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8

  • SHA512

    bb4a630ffdc2f52a7cd8dbbe634bbd3d4d372378dcd3ebfd1302967ebe3452ec7450c6b4fbecca90b19d7b6960727cc8a812d85fe9affd72d498b75020ded354

  • SSDEEP

    6144:4bBxnf7Ucpzq9R+Bo8/y54e/GCzUiyiuguhZNt6E0PxYk:uRc9sC5vrzKhZtEPp

Malware Config

Targets

    • Target

      a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8

    • Size

      278KB

    • MD5

      76b4490b1ea89fb776f075d96369d70b

    • SHA1

      d7a82954b1501dfbf0120eb5a60e61ead3096ab1

    • SHA256

      a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8

    • SHA512

      bb4a630ffdc2f52a7cd8dbbe634bbd3d4d372378dcd3ebfd1302967ebe3452ec7450c6b4fbecca90b19d7b6960727cc8a812d85fe9affd72d498b75020ded354

    • SSDEEP

      6144:4bBxnf7Ucpzq9R+Bo8/y54e/GCzUiyiuguhZNt6E0PxYk:uRc9sC5vrzKhZtEPp

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks