General

  • Target

    6c05973f2ff2f4cf12c8e102e7e80ddd1281353ddde67ad835e8fd6968d47ac1.bin

  • Size

    212KB

  • Sample

    241106-1yhjnsxrbt

  • MD5

    4efd58e418536190ec8f33f04bb9b50e

  • SHA1

    c0538370ff81c1878b8a01e3ec658a9119562e9a

  • SHA256

    6c05973f2ff2f4cf12c8e102e7e80ddd1281353ddde67ad835e8fd6968d47ac1

  • SHA512

    b630d1bdad243acba13bbd15b25fff57690aba6a97001c6471dbddfa6cc94669d64a8f2b63e195f422eeb1899099c7e291269b8a5e39eb897883be8108ec7e99

  • SSDEEP

    3072:Af4rcPraEopc4P5WVTSpKmJ+D9KJXuRIJvSYpETVmdDVIojpwGwsfvsIMaJgcE5Q:AwrqS5WhxIuRIJvfEslpw/seapg/KzV

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Targets

    • Target

      6c05973f2ff2f4cf12c8e102e7e80ddd1281353ddde67ad835e8fd6968d47ac1.bin

    • Size

      212KB

    • MD5

      4efd58e418536190ec8f33f04bb9b50e

    • SHA1

      c0538370ff81c1878b8a01e3ec658a9119562e9a

    • SHA256

      6c05973f2ff2f4cf12c8e102e7e80ddd1281353ddde67ad835e8fd6968d47ac1

    • SHA512

      b630d1bdad243acba13bbd15b25fff57690aba6a97001c6471dbddfa6cc94669d64a8f2b63e195f422eeb1899099c7e291269b8a5e39eb897883be8108ec7e99

    • SSDEEP

      3072:Af4rcPraEopc4P5WVTSpKmJ+D9KJXuRIJvSYpETVmdDVIojpwGwsfvsIMaJgcE5Q:AwrqS5WhxIuRIJvfEslpw/seapg/KzV

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks