General
-
Target
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5.bin
-
Size
205KB
-
Sample
240509-1zj4wsha6y
-
MD5
5795d42dd52b8de0150da1bccf254f39
-
SHA1
d64cb9cb2735e8b9448298556cd1ae73d67414c7
-
SHA256
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5
-
SHA512
1542b53ecc4828de04742fa694765eca322a8131e37cdf616a430044cb23e2647d1a3180b4651c354740abcba5a56a75e763dd54832be28c9b2dca60980f4169
-
SSDEEP
3072:TjMc+vZGSozEYQ6gLD4zlROiv8pWgy6bTOpuFFyIMDb9aoavzIJLnzkEC:TP+v4xo4Rfv8pyX6DMDBAG5C
Static task
static1
Behavioral task
behavioral1
Sample
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5.apk
Resource
android-x64-arm64-20240506-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5.bin
-
Size
205KB
-
MD5
5795d42dd52b8de0150da1bccf254f39
-
SHA1
d64cb9cb2735e8b9448298556cd1ae73d67414c7
-
SHA256
f62b9780e87a1b882125902197894ab4f24960ef47f6aa17855fbdd99f4798e5
-
SHA512
1542b53ecc4828de04742fa694765eca322a8131e37cdf616a430044cb23e2647d1a3180b4651c354740abcba5a56a75e763dd54832be28c9b2dca60980f4169
-
SSDEEP
3072:TjMc+vZGSozEYQ6gLD4zlROiv8pWgy6bTOpuFFyIMDb9aoavzIJLnzkEC:TP+v4xo4Rfv8pyX6DMDBAG5C
-
XLoader payload
-
Requests changing the default SMS application.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1