General

  • Target

    84af57c221c62e6d8951cb6fb67785cee798c193667f8da2003855792748f36c.bin

  • Size

    448KB

  • Sample

    240827-1zdbcatfpd

  • MD5

    f3d230afa1efecaf0e445a77cc0d992f

  • SHA1

    46f88794d25fb0bb0a7f00208f19ca98c0c48463

  • SHA256

    84af57c221c62e6d8951cb6fb67785cee798c193667f8da2003855792748f36c

  • SHA512

    615787b5b86e24fb85cfe8482b30ce5f32cf927c721b1e2075804e7bf42e81e92071277bf14eb7ecf07ebfd0baca8e2ad46006c1605e416dad2e8a1372db6819

  • SSDEEP

    6144:84HCqqC3BUlHOV/GjFmjmxKaXPzGt39CZ6EsvgHFXFTTFfM+UaEPcDkjjf4difog:P1VYHOV/w7UNCLsvglDfBsS+b4dMoYZJ

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      84af57c221c62e6d8951cb6fb67785cee798c193667f8da2003855792748f36c.bin

    • Size

      448KB

    • MD5

      f3d230afa1efecaf0e445a77cc0d992f

    • SHA1

      46f88794d25fb0bb0a7f00208f19ca98c0c48463

    • SHA256

      84af57c221c62e6d8951cb6fb67785cee798c193667f8da2003855792748f36c

    • SHA512

      615787b5b86e24fb85cfe8482b30ce5f32cf927c721b1e2075804e7bf42e81e92071277bf14eb7ecf07ebfd0baca8e2ad46006c1605e416dad2e8a1372db6819

    • SSDEEP

      6144:84HCqqC3BUlHOV/GjFmjmxKaXPzGt39CZ6EsvgHFXFTTFfM+UaEPcDkjjf4difog:P1VYHOV/w7UNCLsvglDfBsS+b4dMoYZJ

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks