General

  • Target

    4ed001e63e8f594f0ac0b02b130c0371e7ac501803f27f768fbbc3ea1ff8d7c7.bin

  • Size

    302KB

  • Sample

    241010-1zqlnsyfqb

  • MD5

    e377c7fea94a948b81749ae97ef3168c

  • SHA1

    f1a13e75c8cbf305f0929eb91c70f6d9a2b40727

  • SHA256

    4ed001e63e8f594f0ac0b02b130c0371e7ac501803f27f768fbbc3ea1ff8d7c7

  • SHA512

    868a35fb88b3e5b448ef7109b9a7b53493df32eb46776348c3b75cfa463dd70fff95818e23de0b2cb7c8ab838b6130460f36248ddc83de20474b49d749f93e85

  • SSDEEP

    6144:X87BxLXrQ14+GXX7iu32fVOlJIj6QPX3z2p9ToCBTzg4i6eWK:XMLXh+GX2u3QVQIjJP3Ixo0eD

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Targets

    • Target

      4ed001e63e8f594f0ac0b02b130c0371e7ac501803f27f768fbbc3ea1ff8d7c7.bin

    • Size

      302KB

    • MD5

      e377c7fea94a948b81749ae97ef3168c

    • SHA1

      f1a13e75c8cbf305f0929eb91c70f6d9a2b40727

    • SHA256

      4ed001e63e8f594f0ac0b02b130c0371e7ac501803f27f768fbbc3ea1ff8d7c7

    • SHA512

      868a35fb88b3e5b448ef7109b9a7b53493df32eb46776348c3b75cfa463dd70fff95818e23de0b2cb7c8ab838b6130460f36248ddc83de20474b49d749f93e85

    • SSDEEP

      6144:X87BxLXrQ14+GXX7iu32fVOlJIj6QPX3z2p9ToCBTzg4i6eWK:XMLXh+GX2u3QVQIjJP3Ixo0eD

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks