General

  • Target

    a942ec76c76d36886e5af513394187580a8f2191be122ccd27a37317b16906cd

  • Size

    278KB

  • Sample

    231220-ndk3vagbe6

  • MD5

    8cfcc9335482600b6414138fcdd53a27

  • SHA1

    424a50f4b74557d35ce5a9ea448be595258da7f6

  • SHA256

    a942ec76c76d36886e5af513394187580a8f2191be122ccd27a37317b16906cd

  • SHA512

    ea86856e8abaa8ea5e0da7c48d72d597d31b33267d654db7261eafbc88a656911e8d1cd574f88eb3a2e2db501297e3e825aefac0d6021b14d156664640a185f5

  • SSDEEP

    6144:h3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaz10xTem70J:pDcbqSCbi4oDGgjuGVCBse20J

Malware Config

Targets

    • Target

      a942ec76c76d36886e5af513394187580a8f2191be122ccd27a37317b16906cd

    • Size

      278KB

    • MD5

      8cfcc9335482600b6414138fcdd53a27

    • SHA1

      424a50f4b74557d35ce5a9ea448be595258da7f6

    • SHA256

      a942ec76c76d36886e5af513394187580a8f2191be122ccd27a37317b16906cd

    • SHA512

      ea86856e8abaa8ea5e0da7c48d72d597d31b33267d654db7261eafbc88a656911e8d1cd574f88eb3a2e2db501297e3e825aefac0d6021b14d156664640a185f5

    • SSDEEP

      6144:h3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaz10xTem70J:pDcbqSCbi4oDGgjuGVCBse20J

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks