General

  • Target

    c28d4e3931aea569612eff46f967349eb03d9981f2ee4660072927e75182a1f3.bin

  • Size

    205KB

  • Sample

    240815-1x1nvs1hqm

  • MD5

    6bdcb0c47552ca78fc1f6c010ee2095a

  • SHA1

    81ada7e1c7edbfd874d5259d02ab54ea48c59f7f

  • SHA256

    c28d4e3931aea569612eff46f967349eb03d9981f2ee4660072927e75182a1f3

  • SHA512

    968651d4a1d57348f0cf70fbb49e8760f7b66a1d9667a77c0ac0059c8cc715ef37b3da61cc41a047c29a47ac55643b126430110b249d4fb33b25f12a63f076d3

  • SSDEEP

    6144:KNkVrLFXMDFytvzbpu1e+kPOP7Fp2Igk0gzmnwcP:KNmrL14opu1jkPODnWrgaB

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      c28d4e3931aea569612eff46f967349eb03d9981f2ee4660072927e75182a1f3.bin

    • Size

      205KB

    • MD5

      6bdcb0c47552ca78fc1f6c010ee2095a

    • SHA1

      81ada7e1c7edbfd874d5259d02ab54ea48c59f7f

    • SHA256

      c28d4e3931aea569612eff46f967349eb03d9981f2ee4660072927e75182a1f3

    • SHA512

      968651d4a1d57348f0cf70fbb49e8760f7b66a1d9667a77c0ac0059c8cc715ef37b3da61cc41a047c29a47ac55643b126430110b249d4fb33b25f12a63f076d3

    • SSDEEP

      6144:KNkVrLFXMDFytvzbpu1e+kPOP7Fp2Igk0gzmnwcP:KNmrL14opu1jkPODnWrgaB

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks