General

  • Target

    3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46.bin

  • Size

    208KB

  • Sample

    240809-18axkswdmd

  • MD5

    d0cc56a38e2aba4294ce4181dd36e5f1

  • SHA1

    a91485ea9c18a0ca738af31d5fff37abf3d615b7

  • SHA256

    3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46

  • SHA512

    39d479ebbc6d2bf3d1f55fcea683dd9befbca9c4f3728a0873c451be2036863ee3d59975653c24f8058d6525a6e6df246274f2dacb6b33639fffe563b229d887

  • SSDEEP

    6144:tgCa1uauEu2axIU1WUHx9y26hBue73dxKUN2+T:KCaYaFjaIUHx9y39ZN2+T

Malware Config

Targets

    • Target

      3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46.bin

    • Size

      208KB

    • MD5

      d0cc56a38e2aba4294ce4181dd36e5f1

    • SHA1

      a91485ea9c18a0ca738af31d5fff37abf3d615b7

    • SHA256

      3c23c3f68691d0fd7f64b0f2d30987f67606448c9fdc81d666d21bea0177bb46

    • SHA512

      39d479ebbc6d2bf3d1f55fcea683dd9befbca9c4f3728a0873c451be2036863ee3d59975653c24f8058d6525a6e6df246274f2dacb6b33639fffe563b229d887

    • SSDEEP

      6144:tgCa1uauEu2axIU1WUHx9y26hBue73dxKUN2+T:KCaYaFjaIUHx9y39ZN2+T

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks