General
-
Target
1b2b2c5cb4b799e8e52daf22d08a8f0ffea17a3afa61f1ebe7cd7896b158334b.bin
-
Size
408KB
-
Sample
240619-cgjhmswemr
-
MD5
f060239384620282d52f7cd14886dd9e
-
SHA1
e7aff236068ee43a8280eba43136fcb0f4cd3d99
-
SHA256
1b2b2c5cb4b799e8e52daf22d08a8f0ffea17a3afa61f1ebe7cd7896b158334b
-
SHA512
a1266fdf474575cc0e8a7fad4a69244d44cb46a9605f8dbf0c543127470d946bcee38d6f950b0a270ca5b240193fe85419130a67e046692d3c286659a4556eb7
-
SSDEEP
12288:by0pLbAg90QLLz7Vk7RlScl3evk6OR7jwflvqn+S2:bysAgrp+zlj60s9ZS2
Static task
static1
Behavioral task
behavioral1
Sample
1b2b2c5cb4b799e8e52daf22d08a8f0ffea17a3afa61f1ebe7cd7896b158334b.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
1b2b2c5cb4b799e8e52daf22d08a8f0ffea17a3afa61f1ebe7cd7896b158334b.bin
-
Size
408KB
-
MD5
f060239384620282d52f7cd14886dd9e
-
SHA1
e7aff236068ee43a8280eba43136fcb0f4cd3d99
-
SHA256
1b2b2c5cb4b799e8e52daf22d08a8f0ffea17a3afa61f1ebe7cd7896b158334b
-
SHA512
a1266fdf474575cc0e8a7fad4a69244d44cb46a9605f8dbf0c543127470d946bcee38d6f950b0a270ca5b240193fe85419130a67e046692d3c286659a4556eb7
-
SSDEEP
12288:by0pLbAg90QLLz7Vk7RlScl3evk6OR7jwflvqn+S2:bysAgrp+zlj60s9ZS2
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-