General

  • Target

    b9bba07e878930faf1c3d49571b3067213f165851fb3fa616fc12e445a6a0bf2.bin

  • Size

    441KB

  • Sample

    241130-16feaa1pej

  • MD5

    039745918a41764640e714e3c5bf7bb7

  • SHA1

    09d6b640b39316dea5a1ba15ab654f76a3303430

  • SHA256

    b9bba07e878930faf1c3d49571b3067213f165851fb3fa616fc12e445a6a0bf2

  • SHA512

    14ff52b4eabcb421eba7ef8caaaecf118157b7bd652a4e66273b9657f27a895e5302f78633782f3c37334b5af53384828a5a326abf75aeb4c0e298688f9da845

  • SSDEEP

    12288:YF2xLcuz4cRa20CCJIZQys4w/FIP2ulKqyuTXhw3:Yqcuz4cs/IKbI9l2Iy

Malware Config

Targets

    • Target

      b9bba07e878930faf1c3d49571b3067213f165851fb3fa616fc12e445a6a0bf2.bin

    • Size

      441KB

    • MD5

      039745918a41764640e714e3c5bf7bb7

    • SHA1

      09d6b640b39316dea5a1ba15ab654f76a3303430

    • SHA256

      b9bba07e878930faf1c3d49571b3067213f165851fb3fa616fc12e445a6a0bf2

    • SHA512

      14ff52b4eabcb421eba7ef8caaaecf118157b7bd652a4e66273b9657f27a895e5302f78633782f3c37334b5af53384828a5a326abf75aeb4c0e298688f9da845

    • SSDEEP

      12288:YF2xLcuz4cRa20CCJIZQys4w/FIP2ulKqyuTXhw3:Yqcuz4cs/IKbI9l2Iy

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks