General

  • Target

    1a761a5e4f98cb6da2a1bfc880c21f4c298d006b9ab8f25afab982ffba0b36b9.apk

  • Size

    282KB

  • Sample

    250209-s57hdawlet

  • MD5

    ccf1d34603787899d0d11b08a3b25c63

  • SHA1

    e1e66f9a6b6ca2945cfedd31084d1e431147da7d

  • SHA256

    1a761a5e4f98cb6da2a1bfc880c21f4c298d006b9ab8f25afab982ffba0b36b9

  • SHA512

    7103765ee7889cf2cfb1782ae478781f64d6ae5c8fba4b696cfe63a9cfe16c46e639080052a86a64202cf32405f8fae4b11ee0b3b5dc349f8a60f55f1bac544f

  • SSDEEP

    6144:iV8tt9aP5fNOUDwtpUb4ofEbjyj0Mv/rl2lEIYg5bC:iVysFNOBzM/LvguIYKm

Malware Config

Extracted

Family

xloader_apk

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36

Targets

    • Target

      1a761a5e4f98cb6da2a1bfc880c21f4c298d006b9ab8f25afab982ffba0b36b9.apk

    • Size

      282KB

    • MD5

      ccf1d34603787899d0d11b08a3b25c63

    • SHA1

      e1e66f9a6b6ca2945cfedd31084d1e431147da7d

    • SHA256

      1a761a5e4f98cb6da2a1bfc880c21f4c298d006b9ab8f25afab982ffba0b36b9

    • SHA512

      7103765ee7889cf2cfb1782ae478781f64d6ae5c8fba4b696cfe63a9cfe16c46e639080052a86a64202cf32405f8fae4b11ee0b3b5dc349f8a60f55f1bac544f

    • SSDEEP

      6144:iV8tt9aP5fNOUDwtpUb4ofEbjyj0Mv/rl2lEIYg5bC:iVysFNOBzM/LvguIYKm

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks