General

  • Target

    e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.bin

  • Size

    288KB

  • Sample

    241112-1y1p9avrel

  • MD5

    b00b9b9360331a8066931934cd88fc26

  • SHA1

    1adcaf0afa08d5b49ec23382899539c3555270af

  • SHA256

    e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550

  • SHA512

    989600bd76d896345cfc6b046d3e0e2375412c7debe9e9ad73ec7f983a190204832f38a74d552783930740dcf5ac131ab35b863334dd1f6bcb3c42676a05f46c

  • SSDEEP

    6144:AKJ7r1V32l3IeWQUktM7SedNDGFOkmep0DpDWScMZeBBxnf7Ucpzq9R+Bo8/y5Y:rnH3SYeWqtM7VAmLJW1TRc9sC5Y

Malware Config

Extracted

Family

xloader_apk

C2

http://36.231.70.96:28856

DES_key

Targets

    • Target

      e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.bin

    • Size

      288KB

    • MD5

      b00b9b9360331a8066931934cd88fc26

    • SHA1

      1adcaf0afa08d5b49ec23382899539c3555270af

    • SHA256

      e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550

    • SHA512

      989600bd76d896345cfc6b046d3e0e2375412c7debe9e9ad73ec7f983a190204832f38a74d552783930740dcf5ac131ab35b863334dd1f6bcb3c42676a05f46c

    • SSDEEP

      6144:AKJ7r1V32l3IeWQUktM7SedNDGFOkmep0DpDWScMZeBBxnf7Ucpzq9R+Bo8/y5Y:rnH3SYeWqtM7VAmLJW1TRc9sC5Y

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks