General

  • Target

    9b73eea2a8d1548001b549e04b5d8ef187a67dc41c3f70869afb09b9a92a4976.bin

  • Size

    260KB

  • Sample

    241128-1zlbyssmcx

  • MD5

    358b384e9e6eb9d5dfba161d04d71522

  • SHA1

    434788b627e33ceea071ea68a594c09722c4c490

  • SHA256

    9b73eea2a8d1548001b549e04b5d8ef187a67dc41c3f70869afb09b9a92a4976

  • SHA512

    6b50a83f4565b77e562c7371082bd804477a760e49c7aa658db47fb39fecc866584cf03d1cb84124d9ecc7870fc2f5c44d77a652f4f063896ad112c925de20e7

  • SSDEEP

    6144:Z5salKpMwvwNBAopu8HGLcA5jjeypOb3nwg6ItM03Rvs:74MMk68K5feaK3wg6Iu0W

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Targets

    • Target

      9b73eea2a8d1548001b549e04b5d8ef187a67dc41c3f70869afb09b9a92a4976.bin

    • Size

      260KB

    • MD5

      358b384e9e6eb9d5dfba161d04d71522

    • SHA1

      434788b627e33ceea071ea68a594c09722c4c490

    • SHA256

      9b73eea2a8d1548001b549e04b5d8ef187a67dc41c3f70869afb09b9a92a4976

    • SHA512

      6b50a83f4565b77e562c7371082bd804477a760e49c7aa658db47fb39fecc866584cf03d1cb84124d9ecc7870fc2f5c44d77a652f4f063896ad112c925de20e7

    • SSDEEP

      6144:Z5salKpMwvwNBAopu8HGLcA5jjeypOb3nwg6ItM03Rvs:74MMk68K5feaK3wg6Iu0W

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks