General

  • Target

    79258769974d7bcdd9b7dc2ca290dfca

  • Size

    445KB

  • Sample

    231226-sytypsefb7

  • MD5

    79258769974d7bcdd9b7dc2ca290dfca

  • SHA1

    5ede2182067fd66ba831e7ebbd72da77a7c7335c

  • SHA256

    790b52994076987f5a949b08a2bad4c7817c1239d57737d4312ac29eddd40121

  • SHA512

    b2610aa06445f0cf98f01ce38eb367822dfc8959cc639c507bab05e6d7c8c83fc78c886df80e0b57359079b8be3487177621cea0609417385139376480051ed5

  • SSDEEP

    12288:ixDA0l+E8JWyaBte+M1SyD7DAEXqyqQnSMey7SQZy8:iAiBrM1SyD7Duy5g8k8

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      79258769974d7bcdd9b7dc2ca290dfca

    • Size

      445KB

    • MD5

      79258769974d7bcdd9b7dc2ca290dfca

    • SHA1

      5ede2182067fd66ba831e7ebbd72da77a7c7335c

    • SHA256

      790b52994076987f5a949b08a2bad4c7817c1239d57737d4312ac29eddd40121

    • SHA512

      b2610aa06445f0cf98f01ce38eb367822dfc8959cc639c507bab05e6d7c8c83fc78c886df80e0b57359079b8be3487177621cea0609417385139376480051ed5

    • SSDEEP

      12288:ixDA0l+E8JWyaBte+M1SyD7DAEXqyqQnSMey7SQZy8:iAiBrM1SyD7Duy5g8k8

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks