General
-
Target
338136e30269eaabec1337c546c96ddc1669e8482b9ac3a9689a62754a6a8d7b.bin
-
Size
283KB
-
Sample
240718-12jadayfll
-
MD5
601c59eee9c61a308bbef188e47ee5fd
-
SHA1
cdb51745242f195724e3e635b4616cba716b692a
-
SHA256
338136e30269eaabec1337c546c96ddc1669e8482b9ac3a9689a62754a6a8d7b
-
SHA512
79296c5061392324842ced10d79b62867139019da4d81aed9f7db34e549b708ff7de011726c56c678c74b36a0283f2957dc9213781dd2c9075228815e1097ac5
-
SSDEEP
6144:M0sciDwdAMTXjkNrHd6ZZIb4D7Ksq9xtFwG:M04DwdN7QHcZrDEjtCG
Static task
static1
Behavioral task
behavioral1
Sample
338136e30269eaabec1337c546c96ddc1669e8482b9ac3a9689a62754a6a8d7b.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
338136e30269eaabec1337c546c96ddc1669e8482b9ac3a9689a62754a6a8d7b.bin
-
Size
283KB
-
MD5
601c59eee9c61a308bbef188e47ee5fd
-
SHA1
cdb51745242f195724e3e635b4616cba716b692a
-
SHA256
338136e30269eaabec1337c546c96ddc1669e8482b9ac3a9689a62754a6a8d7b
-
SHA512
79296c5061392324842ced10d79b62867139019da4d81aed9f7db34e549b708ff7de011726c56c678c74b36a0283f2957dc9213781dd2c9075228815e1097ac5
-
SSDEEP
6144:M0sciDwdAMTXjkNrHd6ZZIb4D7Ksq9xtFwG:M04DwdN7QHcZrDEjtCG
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1