General

  • Target

    a73f0c0f3be18c6a4fd5b1624b73a0e4c1e3742050b0fc816c8ec277a7c5af69.bin

  • Size

    436KB

  • Sample

    240613-atpjbaxbnh

  • MD5

    1f776e653d907e7e1b63c6aa28569ce3

  • SHA1

    fcaccc3abf8caa8f547a4e4fa8351908c0a42299

  • SHA256

    a73f0c0f3be18c6a4fd5b1624b73a0e4c1e3742050b0fc816c8ec277a7c5af69

  • SHA512

    3d0b42b96b33835ecc8f848040bfe503e0cfb38832f7c2b4c58f4904156eb51a14f829b03f8dc94a309d2e0612dc67e3e0c072e0cacef3fe4c92c2258fdb3a07

  • SSDEEP

    12288:7AcWyysVeDaNju9+HkAbtT4qUpKWTB4Cv:Rys7udAbK4Cv

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Targets

    • Target

      a73f0c0f3be18c6a4fd5b1624b73a0e4c1e3742050b0fc816c8ec277a7c5af69.bin

    • Size

      436KB

    • MD5

      1f776e653d907e7e1b63c6aa28569ce3

    • SHA1

      fcaccc3abf8caa8f547a4e4fa8351908c0a42299

    • SHA256

      a73f0c0f3be18c6a4fd5b1624b73a0e4c1e3742050b0fc816c8ec277a7c5af69

    • SHA512

      3d0b42b96b33835ecc8f848040bfe503e0cfb38832f7c2b4c58f4904156eb51a14f829b03f8dc94a309d2e0612dc67e3e0c072e0cacef3fe4c92c2258fdb3a07

    • SSDEEP

      12288:7AcWyysVeDaNju9+HkAbtT4qUpKWTB4Cv:Rys7udAbK4Cv

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks