General

  • Target

    880b8dcc21b5e38baa2f99425d8ca76c46f63792403cbb6ba4dadf3c45f4f59f.bin

  • Size

    260KB

  • Sample

    241129-15vskstmak

  • MD5

    4a2c59e0852a27d29156252d63515e3e

  • SHA1

    6f5b4231388f0f9c58c0c69796107b73f15dabff

  • SHA256

    880b8dcc21b5e38baa2f99425d8ca76c46f63792403cbb6ba4dadf3c45f4f59f

  • SHA512

    552433091573d31237142388501fac4d86ef3b51ca48f219fc6b3c84256e17b44152e0c1de1ae4f5a985d5f9509bfb2496eaf841d0fc71a87cb08054bc5a7404

  • SSDEEP

    6144:Pz+8D4UMlKD9tHNBAogu8HGLqApjjewpIbDnwg6c1mXFmp:L+LT8zh8cpfe0wDwg6ccXM

Malware Config

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key

Targets

    • Target

      880b8dcc21b5e38baa2f99425d8ca76c46f63792403cbb6ba4dadf3c45f4f59f.bin

    • Size

      260KB

    • MD5

      4a2c59e0852a27d29156252d63515e3e

    • SHA1

      6f5b4231388f0f9c58c0c69796107b73f15dabff

    • SHA256

      880b8dcc21b5e38baa2f99425d8ca76c46f63792403cbb6ba4dadf3c45f4f59f

    • SHA512

      552433091573d31237142388501fac4d86ef3b51ca48f219fc6b3c84256e17b44152e0c1de1ae4f5a985d5f9509bfb2496eaf841d0fc71a87cb08054bc5a7404

    • SSDEEP

      6144:Pz+8D4UMlKD9tHNBAogu8HGLqApjjewpIbDnwg6c1mXFmp:L+LT8zh8cpfe0wDwg6ccXM

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks