General

  • Target

    e63e9a14466bec91547ad962cd0d122f37349eb81775c39529aefe40282a69c1.bin

  • Size

    429KB

  • Sample

    241026-1yb2ws1apm

  • MD5

    73ddc9752e52ff0859f0314e869a7db4

  • SHA1

    eab34a977949ffd12f33774696b514565eb46375

  • SHA256

    e63e9a14466bec91547ad962cd0d122f37349eb81775c39529aefe40282a69c1

  • SHA512

    acb4ea2a819bee83516f1e2ecf8011761fd3686653f07542c8e349afb759d554fcf04f63bb7efb1a2711f8a6dc150293b1046b7fb3dfe82a415b349c563bb2eb

  • SSDEEP

    6144:UwmChhaI5Nmb6cEHoBFhdAOkh43gPy/t+5np40swJldR1cJ5I8BOmFmvlb7hr6Wf:zfu6/OvAOUws5np0wJ/R288sLvlb7Vbf

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Targets

    • Target

      e63e9a14466bec91547ad962cd0d122f37349eb81775c39529aefe40282a69c1.bin

    • Size

      429KB

    • MD5

      73ddc9752e52ff0859f0314e869a7db4

    • SHA1

      eab34a977949ffd12f33774696b514565eb46375

    • SHA256

      e63e9a14466bec91547ad962cd0d122f37349eb81775c39529aefe40282a69c1

    • SHA512

      acb4ea2a819bee83516f1e2ecf8011761fd3686653f07542c8e349afb759d554fcf04f63bb7efb1a2711f8a6dc150293b1046b7fb3dfe82a415b349c563bb2eb

    • SSDEEP

      6144:UwmChhaI5Nmb6cEHoBFhdAOkh43gPy/t+5np40swJldR1cJ5I8BOmFmvlb7hr6Wf:zfu6/OvAOUws5np0wJ/R288sLvlb7Vbf

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks