General
-
Target
c61e3483ce844b0632fab4f1edf32b0922591349b35a9598a8724eda5cc23f48.bin
-
Size
412KB
-
Sample
240620-csvp2sxgnp
-
MD5
440f4b5b79a928d59ba6b15db7cc3fac
-
SHA1
98ed2e203b6a9f9428d8c450fbf16cd890c84dcd
-
SHA256
c61e3483ce844b0632fab4f1edf32b0922591349b35a9598a8724eda5cc23f48
-
SHA512
0fe74374aba9266f51080e396e3cfb3a20811f7a0c5bda4dc49681c10d5e8b7e88eaeda994618ccced15a9df0c06139b9c45b47d2ec9537f118aaccde2dc0750
-
SSDEEP
6144:UbQ/lN7KuCcy7RlLMbOFljLevI16OR7rf51Z32ByyflvQ8Xo8EeTwhI26:x7KuCH7RlScl3evk6OR7jwflvqn+x
Static task
static1
Behavioral task
behavioral1
Sample
c61e3483ce844b0632fab4f1edf32b0922591349b35a9598a8724eda5cc23f48.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
c61e3483ce844b0632fab4f1edf32b0922591349b35a9598a8724eda5cc23f48.bin
-
Size
412KB
-
MD5
440f4b5b79a928d59ba6b15db7cc3fac
-
SHA1
98ed2e203b6a9f9428d8c450fbf16cd890c84dcd
-
SHA256
c61e3483ce844b0632fab4f1edf32b0922591349b35a9598a8724eda5cc23f48
-
SHA512
0fe74374aba9266f51080e396e3cfb3a20811f7a0c5bda4dc49681c10d5e8b7e88eaeda994618ccced15a9df0c06139b9c45b47d2ec9537f118aaccde2dc0750
-
SSDEEP
6144:UbQ/lN7KuCcy7RlLMbOFljLevI16OR7rf51Z32ByyflvQ8Xo8EeTwhI26:x7KuCH7RlScl3evk6OR7jwflvqn+x
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1