General
-
Target
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10.bin
-
Size
218KB
-
Sample
240519-1y1egscc36
-
MD5
ad90fb82cdc9b0d8da98b38afc14689f
-
SHA1
5dd0204227148151e4378bc409858042e6ddf009
-
SHA256
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10
-
SHA512
de44cd7d5f868c7ee71e46e1e984699e6ffa5867d0ab7534a0b79b8d1b161bfef56c2a3402e597aa0002b71de4039a7258c494dcc3d7a5b7407bdf073c992a56
-
SSDEEP
6144:wnKfwIGhIJeEbhGi7U8zqdluUfUJ+JUVi:KKfwI5eEbtInXeJ+JUVi
Static task
static1
Behavioral task
behavioral1
Sample
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10.bin
-
Size
218KB
-
MD5
ad90fb82cdc9b0d8da98b38afc14689f
-
SHA1
5dd0204227148151e4378bc409858042e6ddf009
-
SHA256
a81e5f5de0d59e919283d6298757782026b6b7266c1a0d4595ed9bed386a3f10
-
SHA512
de44cd7d5f868c7ee71e46e1e984699e6ffa5867d0ab7534a0b79b8d1b161bfef56c2a3402e597aa0002b71de4039a7258c494dcc3d7a5b7407bdf073c992a56
-
SSDEEP
6144:wnKfwIGhIJeEbhGi7U8zqdluUfUJ+JUVi:KKfwI5eEbtInXeJ+JUVi
-
XLoader payload
-
Checks if the Android device is rooted.
-
Requests changing the default SMS application.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Queries the unique device ID (IMEI, MEID, IMSI)
-