General
-
Target
0d8c39f587f98a405c7dbb02f6a46dc856ad4b24ff385c478de89c39e4ea76ec.bin
-
Size
278KB
-
Sample
240530-27yspaee89
-
MD5
3c97d7099516a6f62179c0d775c1eefd
-
SHA1
d26e69c50a68010d092c8d620bee184fbc183450
-
SHA256
0d8c39f587f98a405c7dbb02f6a46dc856ad4b24ff385c478de89c39e4ea76ec
-
SHA512
2985419f0d4377d90a4a71aec0fb3e03a944ddaca5dcb38ab7c121e32cab525e41dcb96ec352bcc349c5bd98782db46d6af4ef5b3361a60c839a7be728087cbf
-
SSDEEP
6144:sQvSjB6WhOxaPtVfoVj2WqW5TKpC6y6DSent7gtpS85N5rNk6:xvSjJqkojJY4yDp7g7SQhNk6
Static task
static1
Behavioral task
behavioral1
Sample
0d8c39f587f98a405c7dbb02f6a46dc856ad4b24ff385c478de89c39e4ea76ec.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
0d8c39f587f98a405c7dbb02f6a46dc856ad4b24ff385c478de89c39e4ea76ec.bin
-
Size
278KB
-
MD5
3c97d7099516a6f62179c0d775c1eefd
-
SHA1
d26e69c50a68010d092c8d620bee184fbc183450
-
SHA256
0d8c39f587f98a405c7dbb02f6a46dc856ad4b24ff385c478de89c39e4ea76ec
-
SHA512
2985419f0d4377d90a4a71aec0fb3e03a944ddaca5dcb38ab7c121e32cab525e41dcb96ec352bcc349c5bd98782db46d6af4ef5b3361a60c839a7be728087cbf
-
SSDEEP
6144:sQvSjB6WhOxaPtVfoVj2WqW5TKpC6y6DSent7gtpS85N5rNk6:xvSjJqkojJY4yDp7g7SQhNk6
-
XLoader payload
-
Checks if the Android device is rooted.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1