General

  • Target

    62fa7d9e6afa4f530eecc2ad213319821df90db5d1e7f06f9944b6f17bf4d26e.bin

  • Size

    278KB

  • Sample

    241106-1w2vja1ldq

  • MD5

    2b98e1343a9e58a496fd0a20d864b9e1

  • SHA1

    63792b56725151f08ec668293feae48ec703b00d

  • SHA256

    62fa7d9e6afa4f530eecc2ad213319821df90db5d1e7f06f9944b6f17bf4d26e

  • SHA512

    966f5e31fb1d525b404f86191e64a108ee7ee331ca34637cf3e2f2e7fe772da94c1767a4fc4dc3831c7e595121b587b28b57d6376a65008acda82af70d836ba3

  • SSDEEP

    6144:VlrC+q6FrfM0zmSd9gIXihVbD3L6BwQZBJ37tDh4:VlO3660aJIXihVbD3+BwkBFtG

Malware Config

Targets

    • Target

      62fa7d9e6afa4f530eecc2ad213319821df90db5d1e7f06f9944b6f17bf4d26e.bin

    • Size

      278KB

    • MD5

      2b98e1343a9e58a496fd0a20d864b9e1

    • SHA1

      63792b56725151f08ec668293feae48ec703b00d

    • SHA256

      62fa7d9e6afa4f530eecc2ad213319821df90db5d1e7f06f9944b6f17bf4d26e

    • SHA512

      966f5e31fb1d525b404f86191e64a108ee7ee331ca34637cf3e2f2e7fe772da94c1767a4fc4dc3831c7e595121b587b28b57d6376a65008acda82af70d836ba3

    • SSDEEP

      6144:VlrC+q6FrfM0zmSd9gIXihVbD3L6BwQZBJ37tDh4:VlO3660aJIXihVbD3+BwkBFtG

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks