General

  • Target

    3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf.bin

  • Size

    274KB

  • Sample

    241005-11jjrayfmh

  • MD5

    3b9ab71396f25e72573dff07575f0a32

  • SHA1

    1eabc6e8b18ea90b9b2658950e9b958be34cc774

  • SHA256

    3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf

  • SHA512

    84b129c9fd0787ff2b842db1d8e0d9124f4208f9959fa96a8f13b46d9cd23e0760df0984a9681d2adbf606e9af6e5391c9387ab1ae49a1c28e79d3f8f266cadd

  • SSDEEP

    6144:IQNGIdF03azkj+x+xLAPZ65jg1RlE4w3muxxwMTAnIuFL:IAG6KgkjxA65jgNwWujMnIuFL

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf.bin

    • Size

      274KB

    • MD5

      3b9ab71396f25e72573dff07575f0a32

    • SHA1

      1eabc6e8b18ea90b9b2658950e9b958be34cc774

    • SHA256

      3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf

    • SHA512

      84b129c9fd0787ff2b842db1d8e0d9124f4208f9959fa96a8f13b46d9cd23e0760df0984a9681d2adbf606e9af6e5391c9387ab1ae49a1c28e79d3f8f266cadd

    • SSDEEP

      6144:IQNGIdF03azkj+x+xLAPZ65jg1RlE4w3muxxwMTAnIuFL:IAG6KgkjxA65jgNwWujMnIuFL

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks