General
-
Target
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349.bin
-
Size
272KB
-
Sample
240626-1ysdwayhnl
-
MD5
1df8f8fbb9bbc46a9ff8a9839a9d274b
-
SHA1
f1b891298fd7d0e4bb1dde7c90edf9af45aaff66
-
SHA256
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349
-
SHA512
493d6959e088a0b2d2b843e3ff1a83d662501d10ff27ebd60d3e48feceaf4f59bf9d4cfc9141c7e1a2c79532400fa3f79d62aa973bc993908781dc276ace581f
-
SSDEEP
6144:npOuooW4StGJRO8H0r97yCoYQqiUCfH2S54LBkV/dE:ploJ7dN4JtP2IKO/dE
Static task
static1
Behavioral task
behavioral1
Sample
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349.bin
-
Size
272KB
-
MD5
1df8f8fbb9bbc46a9ff8a9839a9d274b
-
SHA1
f1b891298fd7d0e4bb1dde7c90edf9af45aaff66
-
SHA256
a38f40b1f8275273120dafcdc8b0b6771cdce8e368856a56bb5478084b050349
-
SHA512
493d6959e088a0b2d2b843e3ff1a83d662501d10ff27ebd60d3e48feceaf4f59bf9d4cfc9141c7e1a2c79532400fa3f79d62aa973bc993908781dc276ace581f
-
SSDEEP
6144:npOuooW4StGJRO8H0r97yCoYQqiUCfH2S54LBkV/dE:ploJ7dN4JtP2IKO/dE
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-