General
-
Target
16bf9a35183fb43a0e3453d002f302f5b9afa01773f4a7798c755a9276e48e17.bin
-
Size
412KB
-
Sample
240619-c9jdcasdpa
-
MD5
362c0bef1c8fd04cab6d7146034217aa
-
SHA1
3ce82ace4a9d675b5269186e8c411e65b2f76ba4
-
SHA256
16bf9a35183fb43a0e3453d002f302f5b9afa01773f4a7798c755a9276e48e17
-
SHA512
761a5a81a6ad9bed361aba1cffc8f1b0b19f6c469b02f0d127d39b7195a0b8053b6023c5e86794421851c21d244034e0c1c65d89ed41ca8295e76129147b02f5
-
SSDEEP
12288:NfnuV0ymSf5fn7RlScl3evk6OR7jwflvqn+8:luDxf7zlj60s9Z8
Static task
static1
Behavioral task
behavioral1
Sample
16bf9a35183fb43a0e3453d002f302f5b9afa01773f4a7798c755a9276e48e17.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
16bf9a35183fb43a0e3453d002f302f5b9afa01773f4a7798c755a9276e48e17.bin
-
Size
412KB
-
MD5
362c0bef1c8fd04cab6d7146034217aa
-
SHA1
3ce82ace4a9d675b5269186e8c411e65b2f76ba4
-
SHA256
16bf9a35183fb43a0e3453d002f302f5b9afa01773f4a7798c755a9276e48e17
-
SHA512
761a5a81a6ad9bed361aba1cffc8f1b0b19f6c469b02f0d127d39b7195a0b8053b6023c5e86794421851c21d244034e0c1c65d89ed41ca8295e76129147b02f5
-
SSDEEP
12288:NfnuV0ymSf5fn7RlScl3evk6OR7jwflvqn+8:luDxf7zlj60s9Z8
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-