General

  • Target

    b6f07283d5142f38985a8702653ea229cae894a5f1a9fed55caacb76b850bbd6.bin

  • Size

    284KB

  • Sample

    240310-1w1x8scf36

  • MD5

    50236bbb9ae4b11ac720869c9a027821

  • SHA1

    d3e76cde30a71e140284bd88d96184c94ad458e6

  • SHA256

    b6f07283d5142f38985a8702653ea229cae894a5f1a9fed55caacb76b850bbd6

  • SHA512

    c438330096d68094f592bf0e1ca7e8e51ec5f66883d9e5301dae9851928dd28024e71c4be98d979fcb1c7a90de9f2a84a7f144ccd0ab77815b4f1aefe13f19eb

  • SSDEEP

    6144:+oZv/4FdNeaLBf8HDHU/J3tw7z4UFeEbZtmR1sQ2g13SvhIJH3:d9mUaLB08E7zKsqRKhwH3

Malware Config

Targets

    • Target

      b6f07283d5142f38985a8702653ea229cae894a5f1a9fed55caacb76b850bbd6.bin

    • Size

      284KB

    • MD5

      50236bbb9ae4b11ac720869c9a027821

    • SHA1

      d3e76cde30a71e140284bd88d96184c94ad458e6

    • SHA256

      b6f07283d5142f38985a8702653ea229cae894a5f1a9fed55caacb76b850bbd6

    • SHA512

      c438330096d68094f592bf0e1ca7e8e51ec5f66883d9e5301dae9851928dd28024e71c4be98d979fcb1c7a90de9f2a84a7f144ccd0ab77815b4f1aefe13f19eb

    • SSDEEP

      6144:+oZv/4FdNeaLBf8HDHU/J3tw7z4UFeEbZtmR1sQ2g13SvhIJH3:d9mUaLB08E7zKsqRKhwH3

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks