General

  • Target

    a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.bin

  • Size

    209KB

  • Sample

    241106-12zx5ayfqa

  • MD5

    b37cc999ebecaa5d3b80d0e034cf39cc

  • SHA1

    8788f525dc833cf93df087949e47e8ec50957f94

  • SHA256

    a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85

  • SHA512

    5a01e1035b7dae8f7cf047f1b1318414f3c999a7522959091fff8b2bec1390be01d3f4a98bc55c770c05afef83678534942c938c2a22167dbef2a93c42e80e72

  • SSDEEP

    6144:QGMq8GQEojAINykIkXgVuvkOVxq2eH/RDDC:QG/7opNfxQVuvVVXqRDDC

Malware Config

Targets

    • Target

      a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.bin

    • Size

      209KB

    • MD5

      b37cc999ebecaa5d3b80d0e034cf39cc

    • SHA1

      8788f525dc833cf93df087949e47e8ec50957f94

    • SHA256

      a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85

    • SHA512

      5a01e1035b7dae8f7cf047f1b1318414f3c999a7522959091fff8b2bec1390be01d3f4a98bc55c770c05afef83678534942c938c2a22167dbef2a93c42e80e72

    • SSDEEP

      6144:QGMq8GQEojAINykIkXgVuvkOVxq2eH/RDDC:QG/7opNfxQVuvVVXqRDDC

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks