General

  • Target

    d75108dbf3e0d1144ba7f61356c03b100c04b36c6e735dd9b64920912253349b.bin

  • Size

    308KB

  • Sample

    240816-1z3w1azejh

  • MD5

    b691686ac259434d41b4d7c00c407093

  • SHA1

    37c90d3bb945b758991638ecdaa57b76ac31e9e6

  • SHA256

    d75108dbf3e0d1144ba7f61356c03b100c04b36c6e735dd9b64920912253349b

  • SHA512

    099637ad66eb190adb6481237ae79d45bc5dcec17216313d6d10c5db94f993c607736305fc21d872ea183928a69cc3bf221a02be4cb41b2fbe08a0c4b3a73c1c

  • SSDEEP

    6144:eM9sn8F2ERoLjDs1A6A6wQ9oPTHeoZH+hBR5KmFzWizZMPFnl3:eMjFIns12q9S+oeBz5ySsl3

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      d75108dbf3e0d1144ba7f61356c03b100c04b36c6e735dd9b64920912253349b.bin

    • Size

      308KB

    • MD5

      b691686ac259434d41b4d7c00c407093

    • SHA1

      37c90d3bb945b758991638ecdaa57b76ac31e9e6

    • SHA256

      d75108dbf3e0d1144ba7f61356c03b100c04b36c6e735dd9b64920912253349b

    • SHA512

      099637ad66eb190adb6481237ae79d45bc5dcec17216313d6d10c5db94f993c607736305fc21d872ea183928a69cc3bf221a02be4cb41b2fbe08a0c4b3a73c1c

    • SSDEEP

      6144:eM9sn8F2ERoLjDs1A6A6wQ9oPTHeoZH+hBR5KmFzWizZMPFnl3:eMjFIns12q9S+oeBz5ySsl3

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks