General
-
Target
d153ff4d72ee2dd5b894b147c9266f792ad024b2beaa18ace87b3325520a8851.bin
-
Size
500KB
-
Sample
240708-1zrtqstdqe
-
MD5
44ade6d6ad4fe2e46a7d54d964feb968
-
SHA1
018ea89729bbeec09fd3b371354a8ea162361231
-
SHA256
d153ff4d72ee2dd5b894b147c9266f792ad024b2beaa18ace87b3325520a8851
-
SHA512
b7779f0cef185c15dacdf78eb90bf92a0f663829c72bbb0e168ce1cfe446645de7701860e07ee823f59b48c408ea67df768cd6a1aedd1e5d31b49f79e48c847d
-
SSDEEP
12288:X59jmqS8w8dIqNIK2IGMICBtgLm/4KWxaC/eHm9oZyt8kd1fochB:XrSV8KqKK2I/I36wKXIoQ1w4B
Static task
static1
Behavioral task
behavioral1
Sample
d153ff4d72ee2dd5b894b147c9266f792ad024b2beaa18ace87b3325520a8851.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://23.236.67.46:8080
Targets
-
-
Target
d153ff4d72ee2dd5b894b147c9266f792ad024b2beaa18ace87b3325520a8851.bin
-
Size
500KB
-
MD5
44ade6d6ad4fe2e46a7d54d964feb968
-
SHA1
018ea89729bbeec09fd3b371354a8ea162361231
-
SHA256
d153ff4d72ee2dd5b894b147c9266f792ad024b2beaa18ace87b3325520a8851
-
SHA512
b7779f0cef185c15dacdf78eb90bf92a0f663829c72bbb0e168ce1cfe446645de7701860e07ee823f59b48c408ea67df768cd6a1aedd1e5d31b49f79e48c847d
-
SSDEEP
12288:X59jmqS8w8dIqNIK2IGMICBtgLm/4KWxaC/eHm9oZyt8kd1fochB:XrSV8KqKK2I/I36wKXIoQ1w4B
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-