General
-
Target
8210a17f11382b0ef4a13e9c64668a40e5f45c1f319d4f02031cc13fca5cd43f.zip
-
Size
216KB
-
Sample
240624-byvfsstbrb
-
MD5
03e25048586e3c815486d0fb6ffb761a
-
SHA1
11ef780519a0e7ef12238ea7e0a4172dbe408154
-
SHA256
6d2052a05376517cf162aedcfe2dfe97878ea51f777b69200f2dc6922b58e629
-
SHA512
eaaa4ba8f6c13902c812af1331964fd78610b5106f1ed06c8edd727dfc2edd9d3f7b6f16638d19eca8e7ef9494386183570afbc0ec1a2fc69c96f448249797b4
-
SSDEEP
6144:fLUUSfdere2w4iH9lADyyvxZfcAzv+2HrzHsd7F7NhQHk:fwU2dlWTv9vtrzQvQE
Static task
static1
Behavioral task
behavioral1
Sample
8210a17f11382b0ef4a13e9c64668a40e5f45c1f319d4f02031cc13fca5cd43f.apk
Resource
android-33-x64-arm64-20240611.1-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
8210a17f11382b0ef4a13e9c64668a40e5f45c1f319d4f02031cc13fca5cd43f.apk
-
Size
218KB
-
MD5
9ee061573fe4905c8d0c4fb4d69711eb
-
SHA1
d7dfd6e0e692fb23ec5a54b49b4f2d7269bdec05
-
SHA256
8210a17f11382b0ef4a13e9c64668a40e5f45c1f319d4f02031cc13fca5cd43f
-
SHA512
7125456dd39bc360ac3d271159d4b37cbbd9377ad47a07390d0febb61f43ca80b46c2f174206af6813379f9fbf294d9a82652dd021d5f2018bd4d808a5858a6d
-
SSDEEP
3072:t5GxCi3Lu43rUM4BBoE/llbf4shEtAvnUzZe1rkvwyI2oW2Ri0Pu+C0MsDmiBGbI:tep3LHUsE/lrhEt0J1rZyG5iK9hmWcq
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-