General

  • Target

    ceb365c5e0f1c73afdbb892b75ffba264746c53b9a297c4d9455bab0f64824c5.bin

  • Size

    408KB

  • Sample

    240629-1y2mjsxdmb

  • MD5

    d8becd815868e9cd514269efe45db5e6

  • SHA1

    7583c09f3dd37aa72475529dc08a73abe3a83d97

  • SHA256

    ceb365c5e0f1c73afdbb892b75ffba264746c53b9a297c4d9455bab0f64824c5

  • SHA512

    7125d10b7679aea834c06eb960ce7ac30529f8a7430c6eb383fada96ba1e01ea11a229e07bedd95e7137c87909ccdc891c8171e47bb4a5de908db8c0d2f9aa15

  • SSDEEP

    12288:6VSyiqMVaSPNOYDNUHiiQDhu0vUEbqmEYxW:6LiBV7Yy+HiiQFvUE+J7

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.50:28899

DES_key

Targets

    • Target

      ceb365c5e0f1c73afdbb892b75ffba264746c53b9a297c4d9455bab0f64824c5.bin

    • Size

      408KB

    • MD5

      d8becd815868e9cd514269efe45db5e6

    • SHA1

      7583c09f3dd37aa72475529dc08a73abe3a83d97

    • SHA256

      ceb365c5e0f1c73afdbb892b75ffba264746c53b9a297c4d9455bab0f64824c5

    • SHA512

      7125d10b7679aea834c06eb960ce7ac30529f8a7430c6eb383fada96ba1e01ea11a229e07bedd95e7137c87909ccdc891c8171e47bb4a5de908db8c0d2f9aa15

    • SSDEEP

      12288:6VSyiqMVaSPNOYDNUHiiQDhu0vUEbqmEYxW:6LiBV7Yy+HiiQFvUE+J7

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks