{"id":181893,"date":"2024-02-07T23:29:53","date_gmt":"2024-02-08T07:29:53","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=181893"},"modified":"2024-02-26T23:06:24","modified_gmt":"2024-02-27T07:06:24","slug":"moqhao-evolution-new-variants-start-automatically-right-after-installation","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/","title":{"rendered":"MoqHao evolution: New variants start automatically right after installation"},"content":{"rendered":"<p><span data-contrast=\"none\">Authored by Dexter Shin<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015. McAfee Mobile Research Team has also posted <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/?s=moqhao\"><span data-contrast=\"none\">several articles<\/span><\/a><span data-contrast=\"auto\"> related to this malware family that traditionally targets Asian countries such as Korea and Japan.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><span data-contrast=\"auto\">Recently McAfee Mobile Research Team found that MoqHao began distributing variants using very dangerous technique. Basically, the distribution method is the same. They send a link to download the malicious app via the SMS message. Typical MoqHao requires users to install and launch the app to get their desired purpose, but this new variant requires no execution. While the app is installed, their malicious activity starts automatically. This technique was introduced in a <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-hiddenads-malware-that-runs-automatically-and-hides-on-google-play-1m-users-affected\/\"><span data-contrast=\"none\">previous post<\/span><\/a><span data-contrast=\"auto\"> but the difference is that this dangerous technique is now being abused by other well-known active malware campaigns like MoqHao. We have already reported this technique to Google and they are already working on the implementation of mitigations to prevent this type of auto-execution in a future Android version. Android users are currently protected by <\/span><a href=\"https:\/\/support.google.com.mcas.ms\/googleplay\/answer\/2812853?hl=en\"><span data-contrast=\"none\">Google Play Protect<\/span><\/a><span data-contrast=\"auto\">, which is on by default on Android devices with Google Play Services. Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play. McAfee Mobile Security detects this threat as Android\/MoqHao.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span class=\"TextRun MacChromeBold SCXW239739000 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW239739000 BCX0\">How <\/span><span class=\"NormalTextRun SCXW239739000 BCX0\">it is<\/span> <span class=\"NormalTextRun SCXW239739000 BCX0\">distribute<\/span><span class=\"NormalTextRun SCXW239739000 BCX0\">d<\/span><\/span><span class=\"EOP SCXW239739000 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">MoqHao is distributed via phishing SMS messages (also known as Smishing). When a user receives an SMS message containing a malicious link and clicks it, the device downloads the malicious application. Phishing messages are almost the same as in previous campaigns:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-182070\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16.jpg\" alt=\"\" width=\"1102\" height=\"205\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16.jpg 1102w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16-300x56.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16-1024x190.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16-768x143.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/CleanShot-2024-02-08-at-19.16.16-205x38.jpg 205w\" sizes=\"auto, (max-width: 1102px) 100vw, 1102px\" \/><br \/>\n<\/span><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW126519186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW126519186 BCX0\"><span class=\"TextRun MacChromeBold SCXW126519186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">1<\/span><\/span><\/span><span class=\"TextRun MacChromeBold SCXW126519186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">. <\/span><\/span><\/strong><span class=\"TextRun MacChromeBold SCXW126519186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">Smishing message impersonating a notification from a <\/span><\/span><span class=\"TextRun MacChromeBold SCXW126519186 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">courier <\/span><span class=\"NormalTextRun SCXW126519186 BCX0\" data-ccp-parastyle=\"caption\">service.<\/span><\/span><span class=\"EOP SCXW126519186 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One noticeable change is that they now use URL shortener services. If the malware authors use their own domain, it can be quickly blocked but if they use legitimate URL shortener services, it is difficult to block the short domain because it could affect all the URLs used by that service. When a user clicks on the link in the message, it will be redirected to the actual malicious site by the URL shortener service.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">What is new in this variant<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">As mentioned at the beginning, this variant behaves differently from previous ones. Typical MoqHao must be launched manually by the user after it is installed but this variant launches automatically after installation without user interaction:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-181909\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2.png\" alt=\"\" width=\"572\" height=\"503\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2.png 1454w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2-300x264.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2-1024x900.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2-768x675.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure2-147x129.png 147w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/p>\n<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Figure <\/span><\/b><b><span data-contrast=\"auto\">2<\/span><\/b><b><span data-contrast=\"auto\">. <\/span><\/b>Differences between typical MoqHao and Modern MoqHao<\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\"> <span class=\"TextRun SCXW230103488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW230103488 BCX0\">We<\/span> <span class=\"NormalTextRun SCXW230103488 BCX0\">explained<\/span> <span class=\"NormalTextRun SCXW230103488 BCX0\">this <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">auto-execution <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">technique<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> in detail in <\/span><\/span><a class=\"Hyperlink SCXW230103488 BCX0\" href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-hiddenads-malware-that-runs-automatically-and-hides-on-google-play-1m-users-affected\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW230103488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW230103488 BCX0\" data-ccp-charstyle=\"Hyperlink\">a<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\" data-ccp-charstyle=\"Hyperlink\"> previous post<\/span><\/span><\/a><span class=\"TextRun SCXW230103488 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW230103488 BCX0\"> but <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">to <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">briefly <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">summarize<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> it here, Android is designed so when an app is installed and a specific value used by the app is set to be unique, the code runs to check whether the value is unique upon installation. <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">T<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">his<\/span> <span class=\"NormalTextRun SCXW230103488 BCX0\">feature <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">is<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> the one that is<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> being <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">abused <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">by <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">the highly active Trojan family <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW230103488 BCX0\">MoqHao<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> to auto-execute itself without user interaction.<\/span> <span class=\"NormalTextRun SCXW230103488 BCX0\">The <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">distribution, <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">installation,<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> and auto-execution<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> of this <\/span><span class=\"NormalTextRun SCXW230103488 BCX0\">recent <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW230103488 BCX0\">MoqHao<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> variant<\/span><span class=\"NormalTextRun SCXW230103488 BCX0\"> can be seen in the following video:<\/span><\/span><span class=\"EOP SCXW230103488 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/span><\/p>\n<div style=\"text-align: center;\"><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/NuA2QXHXg38?si=bN5VlngQJEEFX3JY\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW146172277 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146172277 BCX0\">On the other <\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">hand,<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">this<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\"> recent <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW146172277 BCX0\">MoqHao<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\"> variant<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">uses<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">Unicode<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\"> strings in app names differently than before.<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">This <\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">technique makes some <\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">characters<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\"> appear bold, but users visually recognize it as \u201cChrome<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">\u201d.<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">This may affect app name-based detection techniques that compare app name<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">(Chrome)<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\"> and package name<\/span> <span class=\"NormalTextRun SCXW146172277 BCX0\">(<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW146172277 BCX0\">com.android<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW146172277 BCX0\">.chrome<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">)<\/span><span class=\"NormalTextRun SCXW146172277 BCX0\">:<\/span><\/span><span class=\"EOP SCXW146172277 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-181951\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM.jpg\" alt=\"\" width=\"874\" height=\"331\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM.jpg 1920w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM-300x113.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM-1024x387.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM-768x290.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM-1536x581.jpg 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.12.05\u202fPM-205x78.jpg 205w\" sizes=\"auto, (max-width: 874px) 100vw, 874px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW155123333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW155123333 BCX0\"><span class=\"TextRun MacChromeBold SCXW155123333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">3<\/span><\/span><\/span><span class=\"TextRun MacChromeBold SCXW155123333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">. <\/span><\/span><\/strong><span class=\"TextRun MacChromeBold SCXW155123333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">App name using <\/span><\/span><span class=\"TextRun MacChromeBold SCXW155123333 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">Unicode<\/span> <span class=\"NormalTextRun SCXW155123333 BCX0\" data-ccp-parastyle=\"caption\">strings.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW63765181 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW63765181 BCX0\">Additionally, they also use social engineering techniques to set malicious apps as the default SMS app.<\/span> <span class=\"NormalTextRun SCXW63765181 BCX0\">Before the settings window appears, they show a message telling you to set up the app to prevent <\/span><span class=\"NormalTextRun SCXW63765181 BCX0\">spam,<\/span> <span class=\"NormalTextRun SCXW63765181 BCX0\">b<\/span><span class=\"NormalTextRun SCXW63765181 BCX0\">ut this message is fake<\/span><span class=\"NormalTextRun SCXW63765181 BCX0\">:<\/span><\/span><span class=\"EOP SCXW63765181 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-181965\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM.jpg\" alt=\"\" width=\"852\" height=\"355\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM.jpg 1484w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM-300x125.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM-1024x426.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM-768x320.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Screenshot-2024-02-07-at-11.13.54\u202fPM-205x85.jpg 205w\" sizes=\"auto, (max-width: 852px) 100vw, 852px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW142085392 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW142085392 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW142085392 BCX0\"><span class=\"TextRun MacChromeBold SCXW142085392 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW142085392 BCX0\" data-ccp-parastyle=\"caption\">4<\/span><\/span><\/span><\/strong><span class=\"TextRun MacChromeBold SCXW142085392 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><strong><span class=\"NormalTextRun SCXW142085392 BCX0\" data-ccp-parastyle=\"caption\">. <\/span><\/strong><span class=\"NormalTextRun SCXW142085392 BCX0\" data-ccp-parastyle=\"caption\">Fake message using social engineering <\/span><span class=\"NormalTextRun SCXW142085392 BCX0\" data-ccp-parastyle=\"caption\">techniques.<\/span><\/span><span class=\"EOP SCXW142085392 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW243771949 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW243771949 BCX0\">Also, the <\/span><span class=\"NormalTextRun SCXW243771949 BCX0\">different languages used in the text<\/span><span class=\"NormalTextRun SCXW243771949 BCX0\"> associated with this behavior suggests that<\/span><span class=\"NormalTextRun SCXW243771949 BCX0\">,<\/span><span class=\"NormalTextRun SCXW243771949 BCX0\"> in addition to Japan, <\/span><span class=\"NormalTextRun SCXW243771949 BCX0\">they<\/span><span class=\"NormalTextRun SCXW243771949 BCX0\"> are also targeting South Korea, France, <\/span><span class=\"NormalTextRun SCXW243771949 BCX0\">Germany, and India<\/span><span class=\"NormalTextRun SCXW243771949 BCX0\">:<\/span><\/span><span class=\"EOP SCXW243771949 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-181979\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5.png\" alt=\"\" width=\"799\" height=\"576\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5.png 1200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5-300x217.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5-1024x739.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5-768x554.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure5-179x129.png 179w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW194051322 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194051322 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW194051322 BCX0\"><span class=\"TextRun MacChromeBold SCXW194051322 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194051322 BCX0\" data-ccp-parastyle=\"caption\">5<\/span><\/span><\/span><span class=\"TextRun MacChromeBold SCXW194051322 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194051322 BCX0\" data-ccp-parastyle=\"caption\">. <\/span><\/span><\/strong><span class=\"TextRun MacChromeBold SCXW194051322 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194051322 BCX0\" data-ccp-parastyle=\"caption\">Fake messages designed to target different <\/span><\/span><span class=\"TextRun MacChromeBold SCXW194051322 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194051322 BCX0\" data-ccp-parastyle=\"caption\">countries.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW152545355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW152545355 BCX0\">After <\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">the <\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">initialization of the malware is <\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">completed, <\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">it<\/span><span class=\"NormalTextRun SCXW152545355 BCX0\"> will<\/span><span class=\"NormalTextRun SCXW152545355 BCX0\"> create a notification channel <\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">that<\/span><span class=\"NormalTextRun SCXW152545355 BCX0\"> will be used to display phishing messages<\/span><span class=\"NormalTextRun SCXW152545355 BCX0\">:<\/span><\/span><span class=\"EOP SCXW152545355 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-181993\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure6.png\" alt=\"\" width=\"596\" height=\"341\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure6.png 972w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure6-300x172.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure6-768x439.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure6-205x117.png 205w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p style=\"text-align: center;\"><strong><span class=\"TextRun MacChromeBold SCXW105066355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">Figure <\/span><\/span><span class=\"FieldRange SCXW105066355 BCX0\"><span class=\"TextRun MacChromeBold SCXW105066355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">6<\/span><\/span><\/span><span class=\"TextRun MacChromeBold SCXW105066355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">. <\/span><\/span><\/strong><span class=\"TextRun MacChromeBold SCXW105066355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">Create a notification channel for <\/span><\/span><span class=\"TextRun MacChromeBold SCXW105066355 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">the next<\/span><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\"> phishing <\/span><span class=\"NormalTextRun SCXW105066355 BCX0\" data-ccp-parastyle=\"caption\">attack.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span class=\"TextRun SCXW8615423 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW8615423 BCX0\">The <\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">malware<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> checks the device&#8217;s carrier and uses this notification to send phishing messages accordingly to <\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">trick<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> users <\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">into<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> click<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">ing<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> on them. <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW8615423 BCX0\">MoqHao<\/span> <span class=\"NormalTextRun SCXW8615423 BCX0\">gets<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> the<\/span> <span class=\"NormalTextRun SCXW8615423 BCX0\">phishing message and the phishing URL<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\"> from Pinterest profile<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">s<\/span><span class=\"NormalTextRun SCXW8615423 BCX0\">.\u00a0<\/span><\/span><span class=\"EOP SCXW8615423 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-182007\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7.png\" alt=\"\" width=\"679\" height=\"448\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7.png 2006w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7-300x198.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7-1024x675.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7-768x506.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7-1536x1012.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure7-196x129.png 196w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/p>\n<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Figure <\/span><\/b><b><span data-contrast=\"auto\">7<\/span><\/b><b><span data-contrast=\"auto\">. <\/span><\/b>Phishing message and URL in Pinterest profile<\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">If the phishing string is empty, MoqHao will use the phishing message in the code:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-182021\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8.png\" alt=\"\" width=\"826\" height=\"322\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8.png 1586w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8-300x117.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8-1024x399.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8-768x299.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8-1536x599.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/02\/Figure8-205x80.png 205w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/p>\n<p style=\"text-align: center;\"><b><span data-contrast=\"auto\">Figure <\/span><\/b><b><span data-contrast=\"auto\">8<\/span><\/b><b><span data-contrast=\"auto\">. <\/span><\/b>Phishing notification code for each carrier<\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This variant also connects to the C2 server via WebSocket. However, it has been confirmed that several other commands have been added in addition to the commands introduced in <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/roaming-mantis-amplifies-smishing-campaign-with-os-specific-android-malware\/\"><span data-contrast=\"none\">the previous post<\/span><\/a><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"21\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">Command<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"65536\"><span data-contrast=\"auto\">Description<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">getSmsKW<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send all SMS messages to C2 server<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">sendSms<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send SMS messages to someone<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">setWifi<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Enable\/disable Wifi<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">gcont<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send whole contacts to C2 server<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">lock<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Store Boolean value in \u201clock\u201d key in SharedPreferences<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">bc<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Check SIM state<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"8\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">setForward<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Store String value in \u201cfs\u201d key in SharedPreferences<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"9\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">getForward<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Get String value in \u201cfs\u201d key in SharedPreferences<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"10\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">hasPkg<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Check specific package installed on device<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"11\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">setRingerMode<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Set Sound\/Vibrate\/Silent mode<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"12\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">setRecEnable<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Set Vibrate\/Silent mode according to SDK version<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"13\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">reqState<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send device information (Network, Power, MAC, Permission) to C2 server<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"14\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">showHome<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Emulate Home button click<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"15\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">getnpki<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send Korean Public Certificate (NPKI) to C2 server<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"16\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">http<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send HTTP requests<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"17\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">call<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Call a specific number with Silent mode<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"18\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">get_apps<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Get list of installed packages<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"19\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">ping<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Check C2 server status<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"20\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">getPhoneState<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Get unique information such as IMEI, SIM number, Android ID, and serial number<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"21\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">get_photo<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">Send all photos to C2 server<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-contrast=\"auto\">MoqHao malware family is an active malware that has been around for years. Although many years have passed, they are using more and more different ways to hide and reach users. We are seeing a much higher number of C2 commands than in previous, the active use of legitimate sites like Pinterest to store and update phishing data, and code with the potential to target Asian countries like Japan and South Korea, as well as countries like France, Germany, and India. Moreover, we expect this new variant to be highly impactful because it infects devices simply by being installed without execution.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><span data-contrast=\"auto\">It is difficult for general users to find fake apps using legitimate icons and application names, so we recommend users to install secure software to protect their devices. For more information, visit <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mobile.html?path=blogs\"><span data-contrast=\"none\">McAfee Mobile Security<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Indicators of Compromise (IOCs)<\/span><\/b><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/h2>\n<table data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1184\" aria-rowcount=\"7\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><span data-contrast=\"none\">SHA256<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Application Name<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Package Name<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">2576a166d3b18eafc2e35a7de3e5549419d10ce62e0eeb24bad5a1daaa257528<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">ch<em><strong>r<\/strong><\/em><\/span><span data-contrast=\"auto\">om<em><strong>e<\/strong><\/em><\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">gb.pi.xcxr.xd<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">61b4cca67762a4cf31209056ea17b6fb212e175ca330015d804122ee6481688e<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">ch<strong><em>ro<\/em><\/strong><\/span><span data-contrast=\"auto\">me<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">malmkb.zdbd.ivakf.lrhrgf<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">b044804cf731cd7dd79000b7c6abce7b642402b275c1eb25712607fc1e5e3d2b<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">ch<strong><em>ro<\/em><\/strong>me<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">vfqhqd.msk.xux.njs<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">bf102125a6fca5e96aed855b45bbed9aa0bc964198ce207f2e63a71487ad793a<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">chro<em><strong>m<\/strong><strong>e<\/strong><\/em><\/span><em><strong>\u00a0<\/strong><\/em><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">hohoj.vlcwu.lm.ext<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"6\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">e72f46f15e50ce7cee5c4c0c5a5277e8be4bb3dd23d08ea79e1deacb8f004136<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\"><em><strong>c<\/strong><\/em>hro<em><strong>m<\/strong><\/em>e<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">enech.hg.rrfy.wrlpp<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"7\">\n<td data-celllook=\"0\"><span data-contrast=\"auto\">f6323f8d8cfa4b5053c65f8c1862a8e6844b35b260f61735b3cf8d19990fef42<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">chr<em><strong>om<\/strong><\/em>e<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"auto\">gqjoyp.cixq.zbh.llr<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first&#8230;<\/p>\n","protected":false},"author":695,"featured_media":176209,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-181893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MoqHao evolution: New variants start automatically right after installation | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MoqHao evolution: New variants start automatically right after installation | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T07:29:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T07:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"MoqHao evolution: New variants start automatically right after installation\",\"datePublished\":\"2024-02-08T07:29:53+00:00\",\"dateModified\":\"2024-02-27T07:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\"},\"wordCount\":1215,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\",\"name\":\"MoqHao evolution: New variants start automatically right after installation | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png\",\"datePublished\":\"2024-02-08T07:29:53+00:00\",\"dateModified\":\"2024-02-27T07:06:24+00:00\",\"description\":\"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"MoqHao evolution: New variants start automatically right after installation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MoqHao evolution: New variants start automatically right after installation | McAfee Blog","description":"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"MoqHao evolution: New variants start automatically right after installation | McAfee Blog","og_description":"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-02-08T07:29:53+00:00","article_modified_time":"2024-02-27T07:06:24+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"MoqHao evolution: New variants start automatically right after installation","datePublished":"2024-02-08T07:29:53+00:00","dateModified":"2024-02-27T07:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/"},"wordCount":1215,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/","name":"MoqHao evolution: New variants start automatically right after installation | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png","datePublished":"2024-02-08T07:29:53+00:00","dateModified":"2024-02-27T07:06:24+00:00","description":"Authored by Dexter Shin\u00a0 MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first discovered in 2015.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/11\/300x200_Blog_110323.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/moqhao-evolution-new-variants-start-automatically-right-after-installation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"MoqHao evolution: New variants start automatically right after installation"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/181893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=181893"}],"version-history":[{"count":13,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/181893\/revisions"}],"predecessor-version":[{"id":184266,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/181893\/revisions\/184266"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/176209"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=181893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=181893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=181893"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=181893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}