General

  • Target

    b70a0bbbb80e8d824d22a0c0ee5da8ca570171c08e9664466382b4ca0d5a7c6b.bin

  • Size

    302KB

  • Sample

    241020-11lzwasfqd

  • MD5

    6fec6864fb7239b050fcb35f10d35ef3

  • SHA1

    16dfe402658628f6cfa13824082b62f83593c4f1

  • SHA256

    b70a0bbbb80e8d824d22a0c0ee5da8ca570171c08e9664466382b4ca0d5a7c6b

  • SHA512

    243396e4a7b5e0bd168198fc1b103865e4c581bd8e0679908175442767bcd62447dc5071f870a185bb901186f7c2bd0f6d63c96cf14af13e80d42e897939d74f

  • SSDEEP

    6144:9WbuHeOjsj06Lvqd9kmKiKlruJ+ea9rqmVMt8vp2bgTnt/aHzBO:94ajs4QvqdXZmre+xRqmO8vPDt/UBO

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Targets

    • Target

      b70a0bbbb80e8d824d22a0c0ee5da8ca570171c08e9664466382b4ca0d5a7c6b.bin

    • Size

      302KB

    • MD5

      6fec6864fb7239b050fcb35f10d35ef3

    • SHA1

      16dfe402658628f6cfa13824082b62f83593c4f1

    • SHA256

      b70a0bbbb80e8d824d22a0c0ee5da8ca570171c08e9664466382b4ca0d5a7c6b

    • SHA512

      243396e4a7b5e0bd168198fc1b103865e4c581bd8e0679908175442767bcd62447dc5071f870a185bb901186f7c2bd0f6d63c96cf14af13e80d42e897939d74f

    • SSDEEP

      6144:9WbuHeOjsj06Lvqd9kmKiKlruJ+ea9rqmVMt8vp2bgTnt/aHzBO:94ajs4QvqdXZmre+xRqmO8vPDt/UBO

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks