General
-
Target
05424e9de8ec4370e434a7d4f0f80a77ba00739bc5cb7b14d981e1ea94fcdc65.bin
-
Size
432KB
-
Sample
240730-1xe26a1fjm
-
MD5
718d3168545398584fbc2b370c0afd85
-
SHA1
9a6ebd3dbc8daf7f1bb4ded3b2ac71cd5f42546e
-
SHA256
05424e9de8ec4370e434a7d4f0f80a77ba00739bc5cb7b14d981e1ea94fcdc65
-
SHA512
f877c31d8b4f04ac222e11f06294adbfbcfed12ca9be0c13b8dc4fb12038b765eb2667e33cf3b6d3e8f1a3eac7830309de6a789bb29a1f1e7d8ce8ba12a9077e
-
SSDEEP
12288:KAcWyysVeDaNju9+HkAbtT4qf0g8rP+WsU21:6ys7udAb1B8r+WW
Static task
static1
Behavioral task
behavioral1
Sample
05424e9de8ec4370e434a7d4f0f80a77ba00739bc5cb7b14d981e1ea94fcdc65.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
05424e9de8ec4370e434a7d4f0f80a77ba00739bc5cb7b14d981e1ea94fcdc65.bin
-
Size
432KB
-
MD5
718d3168545398584fbc2b370c0afd85
-
SHA1
9a6ebd3dbc8daf7f1bb4ded3b2ac71cd5f42546e
-
SHA256
05424e9de8ec4370e434a7d4f0f80a77ba00739bc5cb7b14d981e1ea94fcdc65
-
SHA512
f877c31d8b4f04ac222e11f06294adbfbcfed12ca9be0c13b8dc4fb12038b765eb2667e33cf3b6d3e8f1a3eac7830309de6a789bb29a1f1e7d8ce8ba12a9077e
-
SSDEEP
12288:KAcWyysVeDaNju9+HkAbtT4qf0g8rP+WsU21:6ys7udAb1B8r+WW
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1