General

  • Target

    d5b0b858e2c4a8e895565803d33359adabfd35e5a9aea7c6ce7bbf5d40ce76c6.bin

  • Size

    441KB

  • Sample

    240812-11t1gssgrj

  • MD5

    3fcbc3e4388418d2392b6d50d0ad1580

  • SHA1

    4a776a1a29e6dbce77028a628ce3eb663f08f055

  • SHA256

    d5b0b858e2c4a8e895565803d33359adabfd35e5a9aea7c6ce7bbf5d40ce76c6

  • SHA512

    27189175496b7f7fe5a59f5e6d9a182301c31d1a8088688a3f52d13c42b7157eec000639014c9238302207d347ee3a201112007304368a1fc47b48821dff3d7e

  • SSDEEP

    12288:5HTBZhceHB0kXlQyu3Clc6EOO5ucU3T1X//QoS:lhxhR1Q8lc6ELEFl/Q

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      d5b0b858e2c4a8e895565803d33359adabfd35e5a9aea7c6ce7bbf5d40ce76c6.bin

    • Size

      441KB

    • MD5

      3fcbc3e4388418d2392b6d50d0ad1580

    • SHA1

      4a776a1a29e6dbce77028a628ce3eb663f08f055

    • SHA256

      d5b0b858e2c4a8e895565803d33359adabfd35e5a9aea7c6ce7bbf5d40ce76c6

    • SHA512

      27189175496b7f7fe5a59f5e6d9a182301c31d1a8088688a3f52d13c42b7157eec000639014c9238302207d347ee3a201112007304368a1fc47b48821dff3d7e

    • SSDEEP

      12288:5HTBZhceHB0kXlQyu3Clc6EOO5ucU3T1X//QoS:lhxhR1Q8lc6ELEFl/Q

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks