General
-
Target
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556.bin
-
Size
218KB
-
Sample
240413-1xzrkade9v
-
MD5
96670208b45e2abcad64802ccf1fc141
-
SHA1
a19de2c9d788425ae247c5bba0b231493b17c29a
-
SHA256
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556
-
SHA512
1ea139a74229a99f293427221e8872879ec5f073d288acd16c16eb41a5db594eec0d725249b1a7181953ea384c406a6c62e51643114489e8d611a1ad2ceae43b
-
SSDEEP
6144:jZl11yj5HrFM4y1QXnXf/G/DaxS96vrucoAKU:9EHoiXGraxS9o6xU
Static task
static1
Behavioral task
behavioral1
Sample
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556.bin
-
Size
218KB
-
MD5
96670208b45e2abcad64802ccf1fc141
-
SHA1
a19de2c9d788425ae247c5bba0b231493b17c29a
-
SHA256
1ea9281cbe9e6cdb883ee818f630e1e06276c9c6dc6b70f349f8f23a6ff31556
-
SHA512
1ea139a74229a99f293427221e8872879ec5f073d288acd16c16eb41a5db594eec0d725249b1a7181953ea384c406a6c62e51643114489e8d611a1ad2ceae43b
-
SSDEEP
6144:jZl11yj5HrFM4y1QXnXf/G/DaxS96vrucoAKU:9EHoiXGraxS9o6xU
-
XLoader payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device.
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-