General

  • Target

    7937f485055037cc9e289f3837f166cfe277bbb941607917f116a20e6e1efead.bin

  • Size

    212KB

  • Sample

    241231-1z7vystrbq

  • MD5

    1e080b07b4aad059a8a34386fae98439

  • SHA1

    fccabf48d63007948920539adb3e8b8d275cea8a

  • SHA256

    7937f485055037cc9e289f3837f166cfe277bbb941607917f116a20e6e1efead

  • SHA512

    081779819b342c1e2e242ec269f48f5f7f8f0bdfd38599d0b33eec0e26bff8ea43dcab8bce14e21d17ae0fe29fe65e8642a4ad0f2bef305b0cb8e1b7a13d9376

  • SSDEEP

    6144:GTQrxJqTaB5TqgXWPjBkMIe3/ac9drj6qfxUJ:3NcTaBVgd6c9sbJ

Malware Config

Targets

    • Target

      7937f485055037cc9e289f3837f166cfe277bbb941607917f116a20e6e1efead.bin

    • Size

      212KB

    • MD5

      1e080b07b4aad059a8a34386fae98439

    • SHA1

      fccabf48d63007948920539adb3e8b8d275cea8a

    • SHA256

      7937f485055037cc9e289f3837f166cfe277bbb941607917f116a20e6e1efead

    • SHA512

      081779819b342c1e2e242ec269f48f5f7f8f0bdfd38599d0b33eec0e26bff8ea43dcab8bce14e21d17ae0fe29fe65e8642a4ad0f2bef305b0cb8e1b7a13d9376

    • SSDEEP

      6144:GTQrxJqTaB5TqgXWPjBkMIe3/ac9drj6qfxUJ:3NcTaBVgd6c9sbJ

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks