General
-
Target
036b25b3f9362b569345d257d21e0e21ae07ce32e1fa8bba5d4db10c2df2019f.bin
-
Size
283KB
-
Sample
240626-1y6w9syhql
-
MD5
d08fa201238f38a24da26bab69ee57b7
-
SHA1
5d46fffc2cee0d298de7a0d4b6c6c4c37cd6e300
-
SHA256
036b25b3f9362b569345d257d21e0e21ae07ce32e1fa8bba5d4db10c2df2019f
-
SHA512
9007eaa121f81f4f8ec8e827046f946f5b74377364c9503f67825546186b5a3453917656959bf9cc314aed0bad88345649957fb65043f9cd347f95665e5f01dd
-
SSDEEP
6144:80sciDwdMQ6RkA071qb7kr8aOWQGEuRy0xq40/m31qsD7vw:804DwdgRPa1G47vQGvy0E4FqsPw
Static task
static1
Behavioral task
behavioral1
Sample
036b25b3f9362b569345d257d21e0e21ae07ce32e1fa8bba5d4db10c2df2019f.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
036b25b3f9362b569345d257d21e0e21ae07ce32e1fa8bba5d4db10c2df2019f.bin
-
Size
283KB
-
MD5
d08fa201238f38a24da26bab69ee57b7
-
SHA1
5d46fffc2cee0d298de7a0d4b6c6c4c37cd6e300
-
SHA256
036b25b3f9362b569345d257d21e0e21ae07ce32e1fa8bba5d4db10c2df2019f
-
SHA512
9007eaa121f81f4f8ec8e827046f946f5b74377364c9503f67825546186b5a3453917656959bf9cc314aed0bad88345649957fb65043f9cd347f95665e5f01dd
-
SSDEEP
6144:80sciDwdMQ6RkA071qb7kr8aOWQGEuRy0xq40/m31qsD7vw:804DwdgRPa1G47vQGvy0E4FqsPw
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1