General

  • Target

    a31b7f2e8bcbd8882fd7d2975f8163a2

  • Size

    441KB

  • Sample

    240225-g7jzbadg58

  • MD5

    a31b7f2e8bcbd8882fd7d2975f8163a2

  • SHA1

    e64d6a20ba876c0a0e49be98cab2959bc98cea2b

  • SHA256

    4debbafa2ffc17ba5d2daf063a5587ce7e17ba95d4990a5c5be3956d4852c041

  • SHA512

    ba71daad3e46693371039cc456214722bf74db7565365c6b12eef39c021e247803bc2f4a930e246a4b143e0e5f06f1753c139d9c3352eef86da58e6d17a038ce

  • SSDEEP

    12288:FQGluXbGKkfEZnTD6lbyK7q/1YZ4aqHziYN5UgnwvKxGX8E:aGkKh8Vv1YZ4VT3UgwvYC

Malware Config

Targets

    • Target

      a31b7f2e8bcbd8882fd7d2975f8163a2

    • Size

      441KB

    • MD5

      a31b7f2e8bcbd8882fd7d2975f8163a2

    • SHA1

      e64d6a20ba876c0a0e49be98cab2959bc98cea2b

    • SHA256

      4debbafa2ffc17ba5d2daf063a5587ce7e17ba95d4990a5c5be3956d4852c041

    • SHA512

      ba71daad3e46693371039cc456214722bf74db7565365c6b12eef39c021e247803bc2f4a930e246a4b143e0e5f06f1753c139d9c3352eef86da58e6d17a038ce

    • SSDEEP

      12288:FQGluXbGKkfEZnTD6lbyK7q/1YZ4aqHziYN5UgnwvKxGX8E:aGkKh8Vv1YZ4VT3UgwvYC

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of the MMS message.

    • Acquires the wake lock

MITRE ATT&CK Mobile v15

Tasks