General

  • Target

    c6082f4059da60f4ef5aa4b5f39e5b7b4302db89b899355c72b2e86107972618.bin

  • Size

    453KB

  • Sample

    241008-12f51s1hqm

  • MD5

    d92f7ac8ea0c347b16a42e250f3e5911

  • SHA1

    dd351c0328d57cbdbc6805d7c131e70c75777cb5

  • SHA256

    c6082f4059da60f4ef5aa4b5f39e5b7b4302db89b899355c72b2e86107972618

  • SHA512

    98434bc120b722a8006d8661cf6af7d1dfe162af8ee2bd1d91aea5cabfaf1b16549523baa765e6febcd3a6e6ed01d33e5133f67f8b306199973742fd4af1e5b5

  • SSDEEP

    12288:oujyD0lqNyM4WCICe5AWb4GXMJMS5q+NX5tbiCp:oueDem/5LPXMnq+Zic

Malware Config

Targets

    • Target

      c6082f4059da60f4ef5aa4b5f39e5b7b4302db89b899355c72b2e86107972618.bin

    • Size

      453KB

    • MD5

      d92f7ac8ea0c347b16a42e250f3e5911

    • SHA1

      dd351c0328d57cbdbc6805d7c131e70c75777cb5

    • SHA256

      c6082f4059da60f4ef5aa4b5f39e5b7b4302db89b899355c72b2e86107972618

    • SHA512

      98434bc120b722a8006d8661cf6af7d1dfe162af8ee2bd1d91aea5cabfaf1b16549523baa765e6febcd3a6e6ed01d33e5133f67f8b306199973742fd4af1e5b5

    • SSDEEP

      12288:oujyD0lqNyM4WCICe5AWb4GXMJMS5q+NX5tbiCp:oueDem/5LPXMnq+Zic

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks