General

  • Target

    5c66504ead909de20c61750773a2a76391fe875a7b4d001df8363f6f95bc2613.bin

  • Size

    307KB

  • Sample

    241107-128v2azarh

  • MD5

    c96ebb1d37386aa2a387967f89af3d6b

  • SHA1

    76d555ba5047fe86ebdc293f2ee32ca4e05cd29f

  • SHA256

    5c66504ead909de20c61750773a2a76391fe875a7b4d001df8363f6f95bc2613

  • SHA512

    ffbf797ad3223a9064bf1bc667c9db41a8c8289772c0cfe97d252d268043da7e877ca761f6880f9541195f296c69ac2456dda50e510d225008c3cdddb2883aa0

  • SSDEEP

    6144:+jCn/EDb0jA3FAPFlMAbvpAAdzGVmxJifqk1bdSu1NNg93IOCstDb:Gi3SrwAAdzGVmxJ2xbdzNNg93E+Db

Malware Config

Targets

    • Target

      5c66504ead909de20c61750773a2a76391fe875a7b4d001df8363f6f95bc2613.bin

    • Size

      307KB

    • MD5

      c96ebb1d37386aa2a387967f89af3d6b

    • SHA1

      76d555ba5047fe86ebdc293f2ee32ca4e05cd29f

    • SHA256

      5c66504ead909de20c61750773a2a76391fe875a7b4d001df8363f6f95bc2613

    • SHA512

      ffbf797ad3223a9064bf1bc667c9db41a8c8289772c0cfe97d252d268043da7e877ca761f6880f9541195f296c69ac2456dda50e510d225008c3cdddb2883aa0

    • SSDEEP

      6144:+jCn/EDb0jA3FAPFlMAbvpAAdzGVmxJifqk1bdSu1NNg93IOCstDb:Gi3SrwAAdzGVmxJ2xbdzNNg93E+Db

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks