General

  • Target

    4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058.bin

  • Size

    283KB

  • Sample

    240407-1xefmaff9z

  • MD5

    ac23f6f70c83562c104408d9c23ce490

  • SHA1

    b9e21f3cd8c52ef65c0cc5335ce2264c539b2ffa

  • SHA256

    4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058

  • SHA512

    5078a03f0909c2a6fa15b9c58043d8977f2f6999ddc09305df29fe60b545b64c772a3c0d777b8f6050a8d8ab5cda52c4e1bb5b9215eb869ba2b3df2483629035

  • SSDEEP

    6144:yWZ6munmRZ5DRKX8yJmnTxhnYtyXSxxbZL07QavEE7BAYBxnf7Ucpzq9R+Bo8/y7:lgm5DG8tTxhnYtyiXlacEdAKRc9sC5Z

Malware Config

Targets

    • Target

      4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058.bin

    • Size

      283KB

    • MD5

      ac23f6f70c83562c104408d9c23ce490

    • SHA1

      b9e21f3cd8c52ef65c0cc5335ce2264c539b2ffa

    • SHA256

      4f1acc510c51b925ad03d68199e67499205581f316f0d2ec8dbed23ce8b3c058

    • SHA512

      5078a03f0909c2a6fa15b9c58043d8977f2f6999ddc09305df29fe60b545b64c772a3c0d777b8f6050a8d8ab5cda52c4e1bb5b9215eb869ba2b3df2483629035

    • SSDEEP

      6144:yWZ6munmRZ5DRKX8yJmnTxhnYtyXSxxbZL07QavEE7BAYBxnf7Ucpzq9R+Bo8/y7:lgm5DG8tTxhnYtyiXlacEdAKRc9sC5Z

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks