General
-
Target
3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec.bin
-
Size
274KB
-
Sample
240722-11ekss1epl
-
MD5
d30816dfac1f71e8401d1091419152ef
-
SHA1
3410865a0602e2e92e282fae3a7a21d9a1650ba5
-
SHA256
3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec
-
SHA512
eade4abb9447e0e4f459ac2c6f49593cf80b9f59e02ff4a5c9d356408c1d56df0565b790213c7c16cf8fb7e3f5fc9dfcc5c57ca630bd4c164b01c15b5eb6a763
-
SSDEEP
6144:i1MHVNGIdF03aAE9i1EjZ65jg1RlE4w3muxxwMTAnIukS:i1MH/G6KjE9iqV65jgNwWujMnIukS
Static task
static1
Behavioral task
behavioral1
Sample
3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec.bin
-
Size
274KB
-
MD5
d30816dfac1f71e8401d1091419152ef
-
SHA1
3410865a0602e2e92e282fae3a7a21d9a1650ba5
-
SHA256
3b2924bc0efed041890878c5e91f49a93826fd9580a5bf6e94e90d6fd1df9aec
-
SHA512
eade4abb9447e0e4f459ac2c6f49593cf80b9f59e02ff4a5c9d356408c1d56df0565b790213c7c16cf8fb7e3f5fc9dfcc5c57ca630bd4c164b01c15b5eb6a763
-
SSDEEP
6144:i1MHVNGIdF03aAE9i1EjZ65jg1RlE4w3muxxwMTAnIukS:i1MH/G6KjE9iqV65jgNwWujMnIukS
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-