General

  • Target

    de3b33cbbfc11fa5f1a2711472d1d7438dd2dda2161cfda10cbf3c117b55b166.bin

  • Size

    208KB

  • Sample

    241008-116paawcmf

  • MD5

    7b1fed35a2c11b7e59d7097ee9495204

  • SHA1

    ad81ba3aa820e26db674508985db8fc52f243857

  • SHA256

    de3b33cbbfc11fa5f1a2711472d1d7438dd2dda2161cfda10cbf3c117b55b166

  • SHA512

    c57623852a24d067fbefc2011fbd4e7eed62be59a20e9e161a86b2cb0dc141d7eec3517d242b22efeaede2d45de8b9b784a11f4b46cd1eb33b79d53b4110516e

  • SSDEEP

    6144:0OIv8bKTK1kQvVSKz/h9B+STKFlwp8IzJmW:0zhoFz/rBfK7wpnQW

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.227.39:28844

DES_key

Targets

    • Target

      de3b33cbbfc11fa5f1a2711472d1d7438dd2dda2161cfda10cbf3c117b55b166.bin

    • Size

      208KB

    • MD5

      7b1fed35a2c11b7e59d7097ee9495204

    • SHA1

      ad81ba3aa820e26db674508985db8fc52f243857

    • SHA256

      de3b33cbbfc11fa5f1a2711472d1d7438dd2dda2161cfda10cbf3c117b55b166

    • SHA512

      c57623852a24d067fbefc2011fbd4e7eed62be59a20e9e161a86b2cb0dc141d7eec3517d242b22efeaede2d45de8b9b784a11f4b46cd1eb33b79d53b4110516e

    • SSDEEP

      6144:0OIv8bKTK1kQvVSKz/h9B+STKFlwp8IzJmW:0zhoFz/rBfK7wpnQW

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks