Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    078e383a951ac5dfcc8fbf1733275cf60b48a34c03da55893506f0ce038d6039.bin

  • Size

    209KB

  • Sample

    250321-1y75bs1vg1

  • MD5

    ef83f99e3a20b689d9c293bdf9a21e4b

  • SHA1

    8f7b7063e09cb254e28f9ac97515cfd4c6a20da4

  • SHA256

    078e383a951ac5dfcc8fbf1733275cf60b48a34c03da55893506f0ce038d6039

  • SHA512

    6f2b012ad43d915a6e4ea1f907c20f7dcd160afb42fbf435ff4ddc6fe0e0a6e0e3df950da4a1ce7b52bd113cbe62460e1773843c28155f576c78ac52114dff4b

  • SSDEEP

    6144:j/zsbLltB/kHtakQYR9WXuPno/7d2VhDm0:6LZ8XTiXjzd2VhDm0

Malware Config

Extracted

Family

xloader_apk

C2

https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28856

DES_key

Targets

    • Target

      078e383a951ac5dfcc8fbf1733275cf60b48a34c03da55893506f0ce038d6039.bin

    • Size

      209KB

    • MD5

      ef83f99e3a20b689d9c293bdf9a21e4b

    • SHA1

      8f7b7063e09cb254e28f9ac97515cfd4c6a20da4

    • SHA256

      078e383a951ac5dfcc8fbf1733275cf60b48a34c03da55893506f0ce038d6039

    • SHA512

      6f2b012ad43d915a6e4ea1f907c20f7dcd160afb42fbf435ff4ddc6fe0e0a6e0e3df950da4a1ce7b52bd113cbe62460e1773843c28155f576c78ac52114dff4b

    • SSDEEP

      6144:j/zsbLltB/kHtakQYR9WXuPno/7d2VhDm0:6LZ8XTiXjzd2VhDm0

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks