General

  • Target

    24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc.bin

  • Size

    212KB

  • Sample

    250103-1z3k8sylfj

  • MD5

    d7ea904b8cd38383e1839e264db3e4fb

  • SHA1

    d3d9d27381334347e7cb27c272f45af2237f3c75

  • SHA256

    24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc

  • SHA512

    c466a925e8341a424a885a08ca59868b2cfc7d502fa7b499c677bce793520fd356c02a53dee8a0943588e9342e11f5a29af38be0a2276dd71932c5d84ea5059a

  • SSDEEP

    6144:WgMjFj00EHh5194CdV84Hro0WLmwo0pcxcP:W7sB5n44VP00WCEV

Malware Config

Targets

    • Target

      24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc.bin

    • Size

      212KB

    • MD5

      d7ea904b8cd38383e1839e264db3e4fb

    • SHA1

      d3d9d27381334347e7cb27c272f45af2237f3c75

    • SHA256

      24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc

    • SHA512

      c466a925e8341a424a885a08ca59868b2cfc7d502fa7b499c677bce793520fd356c02a53dee8a0943588e9342e11f5a29af38be0a2276dd71932c5d84ea5059a

    • SSDEEP

      6144:WgMjFj00EHh5194CdV84Hro0WLmwo0pcxcP:W7sB5n44VP00WCEV

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks