General

  • Target

    5dbb0b90875c73558d20bbe97ac397287a39b7f4da0abc62299957d5927adc52.bin

  • Size

    444KB

  • Sample

    240803-1395gsxbqn

  • MD5

    717617d613bad48442b153c65304bed8

  • SHA1

    0451585f5cbfd4fea12059550347e57b7658ff66

  • SHA256

    5dbb0b90875c73558d20bbe97ac397287a39b7f4da0abc62299957d5927adc52

  • SHA512

    c0d15d198d472a06321ad326ee284aa7f41c49afdf221c9a1f36fe060ee61c6db95c4c95f7c621be139c66062d03b0300319c1081c3ae0ecabb352b4884ada86

  • SSDEEP

    12288:N+z+wb76eqEia3tJMbodkRjHCtV9IhY4P433y3r76BPS0LZ18TfjwFL:N+PKeL+boeRjHcV9IhdY3sr76BPS5O

Malware Config

Targets

    • Target

      5dbb0b90875c73558d20bbe97ac397287a39b7f4da0abc62299957d5927adc52.bin

    • Size

      444KB

    • MD5

      717617d613bad48442b153c65304bed8

    • SHA1

      0451585f5cbfd4fea12059550347e57b7658ff66

    • SHA256

      5dbb0b90875c73558d20bbe97ac397287a39b7f4da0abc62299957d5927adc52

    • SHA512

      c0d15d198d472a06321ad326ee284aa7f41c49afdf221c9a1f36fe060ee61c6db95c4c95f7c621be139c66062d03b0300319c1081c3ae0ecabb352b4884ada86

    • SSDEEP

      12288:N+z+wb76eqEia3tJMbodkRjHCtV9IhY4P433y3r76BPS0LZ18TfjwFL:N+PKeL+boeRjHcV9IhdY3sr76BPS5O

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks