General
-
Target
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60.bin
-
Size
250KB
-
Sample
240414-1xxbfahe7s
-
MD5
a375fff24624717b2b029a59569133ac
-
SHA1
2743be088804791d3f955c03b802d3fb7c93c753
-
SHA256
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60
-
SHA512
2a5392517aef66471f1b56d2cedf012300f743d88e674380fcfb50ccaba33c671c627c45da203431e31d55c60493885312c5f9cd132e89db5b20ccb2b479421d
-
SSDEEP
6144:zyH3HRcELNwuyQqV4S1JAoeQ8/bMjl/Bw3sGVxuTD4T9vgv7fU8:83NwudqV4S1J2B/bIl/Z4xuTcTu7U8
Static task
static1
Behavioral task
behavioral1
Sample
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60.bin
-
Size
250KB
-
MD5
a375fff24624717b2b029a59569133ac
-
SHA1
2743be088804791d3f955c03b802d3fb7c93c753
-
SHA256
14e35051b91e2a62d75e96cdcf9fda203df9984d597bdbc97496a12b77d07f60
-
SHA512
2a5392517aef66471f1b56d2cedf012300f743d88e674380fcfb50ccaba33c671c627c45da203431e31d55c60493885312c5f9cd132e89db5b20ccb2b479421d
-
SSDEEP
6144:zyH3HRcELNwuyQqV4S1JAoeQ8/bMjl/Bw3sGVxuTD4T9vgv7fU8:83NwudqV4S1J2B/bIl/Z4xuTcTu7U8
-
XLoader payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device.
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-