General
-
Target
b4d59f55c51ad9d4a3be044d9276843acf3a6b85eef538e09d7d8b17d079580b.bin
-
Size
436KB
-
Sample
240612-28fnhaybmm
-
MD5
568619798876d5c375bb820e9ac0b7f3
-
SHA1
3f97870a5a67f8b9dc058df877dbe57870c182f7
-
SHA256
b4d59f55c51ad9d4a3be044d9276843acf3a6b85eef538e09d7d8b17d079580b
-
SHA512
2e0f3f28edca143012520dfe00c95ed75727aae51ee5cdbd227711b19a1af77fff3bb4ed4b6e37ced06db07a485fee2146ed350bf1785c0ddfb95708f8667333
-
SSDEEP
12288:PYAcWyysVeDaNju9+HkAbtT4qF2yb2d/kAAYcs/:Poys7udAb5b2Og/
Static task
static1
Behavioral task
behavioral1
Sample
b4d59f55c51ad9d4a3be044d9276843acf3a6b85eef538e09d7d8b17d079580b.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
b4d59f55c51ad9d4a3be044d9276843acf3a6b85eef538e09d7d8b17d079580b.bin
-
Size
436KB
-
MD5
568619798876d5c375bb820e9ac0b7f3
-
SHA1
3f97870a5a67f8b9dc058df877dbe57870c182f7
-
SHA256
b4d59f55c51ad9d4a3be044d9276843acf3a6b85eef538e09d7d8b17d079580b
-
SHA512
2e0f3f28edca143012520dfe00c95ed75727aae51ee5cdbd227711b19a1af77fff3bb4ed4b6e37ced06db07a485fee2146ed350bf1785c0ddfb95708f8667333
-
SSDEEP
12288:PYAcWyysVeDaNju9+HkAbtT4qF2yb2d/kAAYcs/:Poys7udAb5b2Og/
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1