General

  • Target

    035aded3af350e933d66cbe4bece2043156cebd43042d3456fb9fa798d98684f.bin

  • Size

    212KB

  • Sample

    241231-1xd5vs1pbv

  • MD5

    8ec85e578a3bce7a7d972d15dc16f5b5

  • SHA1

    b182d16a42fd785170ace1636792300a8b120a07

  • SHA256

    035aded3af350e933d66cbe4bece2043156cebd43042d3456fb9fa798d98684f

  • SHA512

    47f21ba936aeddeb363d003a8b4f09ccf34b718ef5110e47ba291d188b21dd394c695d4f7982a5a9dee8b38466ca7cb0c1b83c7eb34c66172720c9add3755eef

  • SSDEEP

    6144:jkATbydN2aBNTqgnWVjXkMIer9ac9dA5FO:jkAT62aBZSD0c9SO

Malware Config

Targets

    • Target

      035aded3af350e933d66cbe4bece2043156cebd43042d3456fb9fa798d98684f.bin

    • Size

      212KB

    • MD5

      8ec85e578a3bce7a7d972d15dc16f5b5

    • SHA1

      b182d16a42fd785170ace1636792300a8b120a07

    • SHA256

      035aded3af350e933d66cbe4bece2043156cebd43042d3456fb9fa798d98684f

    • SHA512

      47f21ba936aeddeb363d003a8b4f09ccf34b718ef5110e47ba291d188b21dd394c695d4f7982a5a9dee8b38466ca7cb0c1b83c7eb34c66172720c9add3755eef

    • SSDEEP

      6144:jkATbydN2aBNTqgnWVjXkMIer9ac9dA5FO:jkAT62aBZSD0c9SO

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks