General

  • Target

    d75be9ddda723bf09fc79ec745f6dbe3a9bcec63a88ef97a22524b9052320a9c.bin

  • Size

    207KB

  • Sample

    240807-1w5w7avdkq

  • MD5

    98dfd77cab88f44c43c473a3786fc9eb

  • SHA1

    d60bad7464c876f8fcf0602ce311bcac17e4116b

  • SHA256

    d75be9ddda723bf09fc79ec745f6dbe3a9bcec63a88ef97a22524b9052320a9c

  • SHA512

    b64d4dd3685994c7c9d6f2bad01f829592a90696cb3c8badbe15695d358b6248b5eee4108e9d6ccce68d0aedeffc0be112184a1b4e167b92d4fdfde9fa26523a

  • SSDEEP

    6144:qZXYhQLcq+Ea8Po6ZDlaOXTbcqEZxXYFjEeTXP:qkQk2ZRvXveI1EsXP

Malware Config

Targets

    • Target

      d75be9ddda723bf09fc79ec745f6dbe3a9bcec63a88ef97a22524b9052320a9c.bin

    • Size

      207KB

    • MD5

      98dfd77cab88f44c43c473a3786fc9eb

    • SHA1

      d60bad7464c876f8fcf0602ce311bcac17e4116b

    • SHA256

      d75be9ddda723bf09fc79ec745f6dbe3a9bcec63a88ef97a22524b9052320a9c

    • SHA512

      b64d4dd3685994c7c9d6f2bad01f829592a90696cb3c8badbe15695d358b6248b5eee4108e9d6ccce68d0aedeffc0be112184a1b4e167b92d4fdfde9fa26523a

    • SSDEEP

      6144:qZXYhQLcq+Ea8Po6ZDlaOXTbcqEZxXYFjEeTXP:qkQk2ZRvXveI1EsXP

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks