General
-
Target
a524743e432799a5be0dab125f0e6bed8489639276e15fac44793c8f44734932.bin
-
Size
630KB
-
Sample
240627-1zngbatcnb
-
MD5
6a1a2417feada7a94ff5e723b57d055e
-
SHA1
157db3e3ba9aa29bc3c3290c8133473cb6789227
-
SHA256
a524743e432799a5be0dab125f0e6bed8489639276e15fac44793c8f44734932
-
SHA512
8386754a12cf2454ed4b96b042ab44e71b259e01f50675eaa107df70f831a7006b38c48ddfa061c1a512b035f8e4104ae08047ee5fa2d066b2689b33f85d88fa
-
SSDEEP
12288:J9jmqS8w8dIiMmIK2IGMICBtgLm/4KWxaD/eHm9oZyt8kd1foc+5fDVIqUk:XrSV8KiqK2I/I36wKIIoQ1wrVJIqUk
Static task
static1
Behavioral task
behavioral1
Sample
a524743e432799a5be0dab125f0e6bed8489639276e15fac44793c8f44734932.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://23.236.67.46:8080
Targets
-
-
Target
a524743e432799a5be0dab125f0e6bed8489639276e15fac44793c8f44734932.bin
-
Size
630KB
-
MD5
6a1a2417feada7a94ff5e723b57d055e
-
SHA1
157db3e3ba9aa29bc3c3290c8133473cb6789227
-
SHA256
a524743e432799a5be0dab125f0e6bed8489639276e15fac44793c8f44734932
-
SHA512
8386754a12cf2454ed4b96b042ab44e71b259e01f50675eaa107df70f831a7006b38c48ddfa061c1a512b035f8e4104ae08047ee5fa2d066b2689b33f85d88fa
-
SSDEEP
12288:J9jmqS8w8dIiMmIK2IGMICBtgLm/4KWxaD/eHm9oZyt8kd1foc+5fDVIqUk:XrSV8KiqK2I/I36wKIIoQ1wrVJIqUk
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Checks the presence of a debugger
-