General
-
Target
32484162f7b9d9bc173adb69e8089c0e2a57621a93c744a4650126f22953d699.bin
-
Size
408KB
-
Sample
240629-1yy7esxdlf
-
MD5
3554e5c6217af10fc5ce082c2fe00316
-
SHA1
413e12893ca37513b55ab173066dd3feb790902b
-
SHA256
32484162f7b9d9bc173adb69e8089c0e2a57621a93c744a4650126f22953d699
-
SHA512
1bd6299065edc905776bddd4aa4fb892bf3da2daf7f2a401031a831e62a51325b61f3825e36d0ab13fc534b3ea6be43fe80476415d7ed18a9c941ab5cca4c4d4
-
SSDEEP
6144:fPej+oCCUNsMPOayQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwu9:XejxynDNUHiiQDhu0vUEbqmEYxO
Static task
static1
Behavioral task
behavioral1
Sample
32484162f7b9d9bc173adb69e8089c0e2a57621a93c744a4650126f22953d699.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
32484162f7b9d9bc173adb69e8089c0e2a57621a93c744a4650126f22953d699.bin
-
Size
408KB
-
MD5
3554e5c6217af10fc5ce082c2fe00316
-
SHA1
413e12893ca37513b55ab173066dd3feb790902b
-
SHA256
32484162f7b9d9bc173adb69e8089c0e2a57621a93c744a4650126f22953d699
-
SHA512
1bd6299065edc905776bddd4aa4fb892bf3da2daf7f2a401031a831e62a51325b61f3825e36d0ab13fc534b3ea6be43fe80476415d7ed18a9c941ab5cca4c4d4
-
SSDEEP
6144:fPej+oCCUNsMPOayQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwu9:XejxynDNUHiiQDhu0vUEbqmEYxO
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1