General

  • Target

    b1d26127aaf6c223deafce17e9bd70a74926b4c4e5b5e6166b24f8e58f7120fd.zip

  • Size

    203KB

  • Sample

    250327-c6td5syk17

  • MD5

    326c21f35e7797331044ee6312a661bc

  • SHA1

    174c847edb872973086fcb39bfbe1d100ca0282e

  • SHA256

    b1d26127aaf6c223deafce17e9bd70a74926b4c4e5b5e6166b24f8e58f7120fd

  • SHA512

    8548c74039b543dc5b921abd9a2ea1a02098335bb6d5a47acfdc308e55c7f0dddde33dcc903f119e3c86bf8693e6266546e83d18fc8c6073fc738127c7cc744c

  • SSDEEP

    6144:d5nnf+z9+8TFRw7M1FXPN2GVQ5VawnkKT:72B+uRw7MTXrQ5Va0fT

Malware Config

Extracted

Family

xloader_apk

C2

https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic

Attributes
  • user_agent

    Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36

Extracted

Family

xloader_apk

C2

http://91.204.226.105:28856

DES_key

Targets

    • Target

      7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a.apk

    • Size

      205KB

    • MD5

      b46157e537fddb256f8ebf5965edd34b

    • SHA1

      410e4332d470e764e13ab8016cf4cc23fb74f64e

    • SHA256

      7843d056e42bc194275b946226418c1dd1929b4ae9438a20846d4deb67e6682a

    • SHA512

      6446d22573587e28cb67607954ad25221b0d9b03eb131acdb00dae66ecec3695557901fdf19b26417c387c1c9f57e87170a90f975cbdaf39008c96246849f67a

    • SSDEEP

      3072:s/AiTJ7pW7LD4zlROiv8pWgy6bTOpuFFyIMDb9aoavzIJLPKi9sLH:ebTJ724Rfv8pyX6DMDBAGJOz

    • XLoader payload

    • XLoader, MoqHao

      An Android banker and info stealer.

    • Xloader_apk family

    • Checks if the Android device is rooted.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Reads the content of the MMS message.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks