General

  • Target

    3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec.bin

  • Size

    274KB

  • Sample

    240722-11ekss1epl

  • MD5

    d30816dfac1f71e8401d1091419152ef

  • SHA1

    3410865a0602e2e92e282fae3a7a21d9a1650ba5

  • SHA256

    3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec

  • SHA512

    eade4abb9447e0e4f459ac2c6f49593cf80b9f59e02ff4a5c9d356408c1d56df0565b790213c7c16cf8fb7e3f5fc9dfcc5c57ca630bd4c164b01c15b5eb6a763

  • SSDEEP

    6144:i1MHVNGIdF03aAE9i1EjZ65jg1RlE4w3muxxwMTAnIukS:i1MH/G6KjE9iqV65jgNwWujMnIukS

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec.bin

    • Size

      274KB

    • MD5

      d30816dfac1f71e8401d1091419152ef

    • SHA1

      3410865a0602e2e92e282fae3a7a21d9a1650ba5

    • SHA256

      3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec

    • SHA512

      eade4abb9447e0e4f459ac2c6f49593cf80b9f59e02ff4a5c9d356408c1d56df0565b790213c7c16cf8fb7e3f5fc9dfcc5c57ca630bd4c164b01c15b5eb6a763

    • SSDEEP

      6144:i1MHVNGIdF03aAE9i1EjZ65jg1RlE4w3muxxwMTAnIukS:i1MH/G6KjE9iqV65jgNwWujMnIukS

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks