General

  • Target

    155000d9b05803757a0d6619371e6c835ee55061757306a1f791c6a606179316.bin

  • Size

    273KB

  • Sample

    241105-2nvxpazerh

  • MD5

    103ade554b9091bc38ad9ce1a9d0eba4

  • SHA1

    2737971ca87ab1a20684e17f8b944667f4839d22

  • SHA256

    155000d9b05803757a0d6619371e6c835ee55061757306a1f791c6a606179316

  • SHA512

    947d26879de7f1d26947deba61e0a833236ab9f190f4a8ac853728bbd579e6e05e061c97feba0ceb6f17f74d235763952b1556995881d55b26ee128676b5c53a

  • SSDEEP

    6144:geNjRKb3TgLCvvxNZ+11jjzAvRYFZKFoxKPDndxbz1agtD:gsj+TgLKH+bj8vRYauxyDdxn0gx

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28844

DES_key

Targets

    • Target

      155000d9b05803757a0d6619371e6c835ee55061757306a1f791c6a606179316.bin

    • Size

      273KB

    • MD5

      103ade554b9091bc38ad9ce1a9d0eba4

    • SHA1

      2737971ca87ab1a20684e17f8b944667f4839d22

    • SHA256

      155000d9b05803757a0d6619371e6c835ee55061757306a1f791c6a606179316

    • SHA512

      947d26879de7f1d26947deba61e0a833236ab9f190f4a8ac853728bbd579e6e05e061c97feba0ceb6f17f74d235763952b1556995881d55b26ee128676b5c53a

    • SSDEEP

      6144:geNjRKb3TgLCvvxNZ+11jjzAvRYFZKFoxKPDndxbz1agtD:gsj+TgLKH+bj8vRYauxyDdxn0gx

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks