General
-
Target
5fd68667b7fc8c83eab360c4014528aca926df2dba879b743188d4a29881ef16.bin
-
Size
412KB
-
Sample
240629-1xscgs1blp
-
MD5
ecac1769596b243d2db8d47a2e21088f
-
SHA1
2891a7bf98f2a83df611fc943a0214a33c594baf
-
SHA256
5fd68667b7fc8c83eab360c4014528aca926df2dba879b743188d4a29881ef16
-
SHA512
d06436235327929aad18952c583661e4d0934efd6bcccec78c3916580515193da8dfa9db98bc6f5d174bb7e5f7aa17be175bf5d24c77dfe6ac2497aee0b6aaf7
-
SSDEEP
6144:MyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwu+2nwWk4hekf1DPv0hMHrLz:4DNUHiiQDhu0vUEbqmEYxswaekf1Y+vz
Static task
static1
Behavioral task
behavioral1
Sample
5fd68667b7fc8c83eab360c4014528aca926df2dba879b743188d4a29881ef16.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
5fd68667b7fc8c83eab360c4014528aca926df2dba879b743188d4a29881ef16.bin
-
Size
412KB
-
MD5
ecac1769596b243d2db8d47a2e21088f
-
SHA1
2891a7bf98f2a83df611fc943a0214a33c594baf
-
SHA256
5fd68667b7fc8c83eab360c4014528aca926df2dba879b743188d4a29881ef16
-
SHA512
d06436235327929aad18952c583661e4d0934efd6bcccec78c3916580515193da8dfa9db98bc6f5d174bb7e5f7aa17be175bf5d24c77dfe6ac2497aee0b6aaf7
-
SSDEEP
6144:MyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwu+2nwWk4hekf1DPv0hMHrLz:4DNUHiiQDhu0vUEbqmEYxswaekf1Y+vz
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1