General

  • Target

    9dbaf3fc97d34f38385463a56a5cfde2cf0a668354750be9f48739d4d5955add.bin

  • Size

    209KB

  • Sample

    240225-1xq5esec3t

  • MD5

    6806112670ddcb1f4615491005e39248

  • SHA1

    82a3245069f21fdb93ce953714bb9c560aabedc6

  • SHA256

    9dbaf3fc97d34f38385463a56a5cfde2cf0a668354750be9f48739d4d5955add

  • SHA512

    eaa370a57911572ac21cf06dc777fe3db44ed568f18f8051a1a85ae0e7152bba66f51ff2b06b2f74c9d67d84782f7723739a9e6e8939be5fd93afdd71056c6a5

  • SSDEEP

    6144:Sr2DVUGPS4igL/op/do/D6nML8ZDNCrYKZ8q+AAJZJ:SSGGWcO/QWDNCrkAUZJ

Malware Config

Targets

    • Target

      9dbaf3fc97d34f38385463a56a5cfde2cf0a668354750be9f48739d4d5955add.bin

    • Size

      209KB

    • MD5

      6806112670ddcb1f4615491005e39248

    • SHA1

      82a3245069f21fdb93ce953714bb9c560aabedc6

    • SHA256

      9dbaf3fc97d34f38385463a56a5cfde2cf0a668354750be9f48739d4d5955add

    • SHA512

      eaa370a57911572ac21cf06dc777fe3db44ed568f18f8051a1a85ae0e7152bba66f51ff2b06b2f74c9d67d84782f7723739a9e6e8939be5fd93afdd71056c6a5

    • SSDEEP

      6144:Sr2DVUGPS4igL/op/do/D6nML8ZDNCrYKZ8q+AAJZJ:SSGGWcO/QWDNCrkAUZJ

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of the MMS message.

    • Acquires the wake lock

MITRE ATT&CK Mobile v15

Tasks