General

  • Target

    6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1.bin

  • Size

    278KB

  • Sample

    241022-14by3swhmc

  • MD5

    769340c0fcb9bad35a0916636286f776

  • SHA1

    b812f5aaff6843bbf9ae091bf0fb6e9cd4b40fed

  • SHA256

    6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1

  • SHA512

    6306af45ea8eedea1f648410212adf17c5935e6456914856ac04a6b301714b7c5aeee0dbbeb26962ea61dda2a6e77db412f126cebecfd1c02bb902d7dcdac713

  • SSDEEP

    6144:ldQvSjB6WhOxaP3qXHsbdA1Vj2WqW5TKpC6y6DSent7gtpS85N5+4+:lmvSjJqbXHwATjJY4yDp7g7SQ8F

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Targets

    • Target

      6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1.bin

    • Size

      278KB

    • MD5

      769340c0fcb9bad35a0916636286f776

    • SHA1

      b812f5aaff6843bbf9ae091bf0fb6e9cd4b40fed

    • SHA256

      6088d74c622aeb5187d0aeb257d0ca8e0ee009e9f69e204be10c4736ece0aca1

    • SHA512

      6306af45ea8eedea1f648410212adf17c5935e6456914856ac04a6b301714b7c5aeee0dbbeb26962ea61dda2a6e77db412f126cebecfd1c02bb902d7dcdac713

    • SSDEEP

      6144:ldQvSjB6WhOxaP3qXHsbdA1Vj2WqW5TKpC6y6DSent7gtpS85N5+4+:lmvSjJqbXHwATjJY4yDp7g7SQ8F

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks