General

  • Target

    9e570d50a20902cae53d54ba39a79c05_JaffaCakes118

  • Size

    302KB

  • Sample

    240816-phqdssyapl

  • MD5

    9e570d50a20902cae53d54ba39a79c05

  • SHA1

    9e38d058a68692a04fbaac87e7e563b9885cb9d9

  • SHA256

    b13856e604ab4dbd3fdef7b5ba4a22622760990d16a002867dcec02b78c275cf

  • SHA512

    d4b5b5ae12f53534e41d082d8a73d5829cf43d206f8a2a6955b4968118bccb6ec3376e006e9476634fdfa3763c2808a7d7aaba46ecc5bdbd26aef9d93745ba1d

  • SSDEEP

    6144:h4N8EMLFo5Pl+wPlShAz7q+ZIsar0cV0WDnKGE6Es2U5CEsmkj4eXwaglj:hWOhzwPlSCz7q+ZIs4Y2KH6ES5CEsmkK

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      9e570d50a20902cae53d54ba39a79c05_JaffaCakes118

    • Size

      302KB

    • MD5

      9e570d50a20902cae53d54ba39a79c05

    • SHA1

      9e38d058a68692a04fbaac87e7e563b9885cb9d9

    • SHA256

      b13856e604ab4dbd3fdef7b5ba4a22622760990d16a002867dcec02b78c275cf

    • SHA512

      d4b5b5ae12f53534e41d082d8a73d5829cf43d206f8a2a6955b4968118bccb6ec3376e006e9476634fdfa3763c2808a7d7aaba46ecc5bdbd26aef9d93745ba1d

    • SSDEEP

      6144:h4N8EMLFo5Pl+wPlShAz7q+ZIsar0cV0WDnKGE6Es2U5CEsmkj4eXwaglj:hWOhzwPlSCz7q+ZIs4Y2KH6ES5CEsmkK

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks