General

  • Target

    aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0

  • Size

    278KB

  • Sample

    231220-ngvfpaged4

  • MD5

    3a06aae100ab577d6fcdd66875ed7ef8

  • SHA1

    1af4e4becf498622c3b28acbdb913a64cb494b65

  • SHA256

    aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0

  • SHA512

    e3ac1f870e033a6e77a09932099e7d723341ebede75670d844511085b7773ca7781f1a95a5fbc5d96d3c0127e366f04e149bea280fef8e5f81263fa5aaa28ed1

  • SSDEEP

    6144:deQGVSk+cpzqjR+Bo8/y5+JMzInDJ845pNpaBq98iEeCfGTWr4ADDco:oQkSkyjsC5+J/i45jAqenFfGScQDco

Malware Config

Targets

    • Target

      aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0

    • Size

      278KB

    • MD5

      3a06aae100ab577d6fcdd66875ed7ef8

    • SHA1

      1af4e4becf498622c3b28acbdb913a64cb494b65

    • SHA256

      aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0

    • SHA512

      e3ac1f870e033a6e77a09932099e7d723341ebede75670d844511085b7773ca7781f1a95a5fbc5d96d3c0127e366f04e149bea280fef8e5f81263fa5aaa28ed1

    • SSDEEP

      6144:deQGVSk+cpzqjR+Bo8/y5+JMzInDJ845pNpaBq98iEeCfGTWr4ADDco:oQkSkyjsC5+J/i45jAqenFfGScQDco

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks