General

  • Target

    d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856.bin

  • Size

    209KB

  • Sample

    240918-1yxctsvgmg

  • MD5

    abd5d60bef35d0c9e3de4684475bbca4

  • SHA1

    3b54c9f93813fe434b774cd24dd3c6fca9b258c3

  • SHA256

    d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856

  • SHA512

    d1bb26f9837b0582ec71ca2777735a6fc90492160bb6aada031a41e074876563f97dcc4a02e5ce7f40b55b4a5143a79625a5410fbd44e85fdf1e22e7c70acf26

  • SSDEEP

    3072:l/SnsWhVENmFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpQr6wMl7e:lwEZkHtakQYR9WXuPno/7d2VUlWe

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856.bin

    • Size

      209KB

    • MD5

      abd5d60bef35d0c9e3de4684475bbca4

    • SHA1

      3b54c9f93813fe434b774cd24dd3c6fca9b258c3

    • SHA256

      d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856

    • SHA512

      d1bb26f9837b0582ec71ca2777735a6fc90492160bb6aada031a41e074876563f97dcc4a02e5ce7f40b55b4a5143a79625a5410fbd44e85fdf1e22e7c70acf26

    • SSDEEP

      3072:l/SnsWhVENmFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpQr6wMl7e:lwEZkHtakQYR9WXuPno/7d2VUlWe

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks