General
-
Target
b9f9f06aba9c2cfb5a71be062cf8eaa40478dfb4049b158ee6829d634079f534.bin
-
Size
412KB
-
Sample
240620-cxybqsyapr
-
MD5
7a9aa5e7cf520e53d0fb500d585c4445
-
SHA1
28f228fb51f8c08bfa1d7b695182f958b3a257d1
-
SHA256
b9f9f06aba9c2cfb5a71be062cf8eaa40478dfb4049b158ee6829d634079f534
-
SHA512
4807e09826a963f46a67fe10d9658f71ffbed0b92b5deb99d68f7b884b3c7f2ff49eaa04d2704bdf933d5ea236033eb0fe05837fcd452427f87704a5145fad54
-
SSDEEP
12288:K7RlScl3evk6OR7jwflvqn+jEAT/XCc+riTS:Ezlj60s9ZjBTfC1CS
Static task
static1
Behavioral task
behavioral1
Sample
b9f9f06aba9c2cfb5a71be062cf8eaa40478dfb4049b158ee6829d634079f534.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
b9f9f06aba9c2cfb5a71be062cf8eaa40478dfb4049b158ee6829d634079f534.bin
-
Size
412KB
-
MD5
7a9aa5e7cf520e53d0fb500d585c4445
-
SHA1
28f228fb51f8c08bfa1d7b695182f958b3a257d1
-
SHA256
b9f9f06aba9c2cfb5a71be062cf8eaa40478dfb4049b158ee6829d634079f534
-
SHA512
4807e09826a963f46a67fe10d9658f71ffbed0b92b5deb99d68f7b884b3c7f2ff49eaa04d2704bdf933d5ea236033eb0fe05837fcd452427f87704a5145fad54
-
SSDEEP
12288:K7RlScl3evk6OR7jwflvqn+jEAT/XCc+riTS:Ezlj60s9ZjBTfC1CS
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1