Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/02/2025, 06:13 UTC

250228-gy5jnatqs6 10

28/02/2025, 06:09 UTC

250228-gwrvsatpx2 10

General

  • Target

    febb1e8d2d85567e8cca1e28ad6f6ccb0f3780456af8b330ca365fa36bdb6998.apk

  • Size

    164KB

  • Sample

    250228-gwrvsatpx2

  • MD5

    902d27bad3c9c892c4722528c8cff0ca

  • SHA1

    e1248a91d6161f64661ced66f902364fd1c6a0cb

  • SHA256

    febb1e8d2d85567e8cca1e28ad6f6ccb0f3780456af8b330ca365fa36bdb6998

  • SHA512

    7b52784263e7441291fcefa56938b93de48ad6dcb47afc11fa5f1f3601d66a2a131ec3ace7015f50ad3b954beb36ce24cb9a6ca0987f64bba4b43618adf94c32

  • SSDEEP

    3072:Gfy7lXnqr+MFchH62h60RYxPhqnUYF//+x7g/PQsJ3s:Gfy7lXnqr+2SthAxPhqnUYOIPQKs

Malware Config

Extracted

Family

xloader_apk

C2

https://m.vk.com/id730148259?act=info

https://m.vk.com/id730149630?act=info

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Mobile Safari/537.36 Edg/112.0.0.0

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.54:28899

DES_key
1
4162356431513332

Targets

    • Target

      febb1e8d2d85567e8cca1e28ad6f6ccb0f3780456af8b330ca365fa36bdb6998.apk

    • Size

      164KB

    • MD5

      902d27bad3c9c892c4722528c8cff0ca

    • SHA1

      e1248a91d6161f64661ced66f902364fd1c6a0cb

    • SHA256

      febb1e8d2d85567e8cca1e28ad6f6ccb0f3780456af8b330ca365fa36bdb6998

    • SHA512

      7b52784263e7441291fcefa56938b93de48ad6dcb47afc11fa5f1f3601d66a2a131ec3ace7015f50ad3b954beb36ce24cb9a6ca0987f64bba4b43618adf94c32

    • SSDEEP

      3072:Gfy7lXnqr+MFchH62h60RYxPhqnUYF//+x7g/PQsJ3s:Gfy7lXnqr+2SthAxPhqnUYOIPQKs

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests changing the default SMS application.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.