General
-
Target
807cccc21399415e085a2d46c5fef587c8627d6af8f643a50bff26b5361afb7d.bin
-
Size
412KB
-
Sample
240803-13jyas1gpa
-
MD5
66df38c6226f11fbd300a04f78e8bc1c
-
SHA1
21f2165c38a60e10f5feb2ff5511ed52c87dddf7
-
SHA256
807cccc21399415e085a2d46c5fef587c8627d6af8f643a50bff26b5361afb7d
-
SHA512
5564905c1adf80fce105444540da12e764f1d86ef98d4d3787045dc7180bf230d7c89900d906cd079b78cdb9cb45ebc6abab1d62e67eea4a9728ca8bd547773c
-
SSDEEP
6144:n2k9yK/TZmjVVzCpiceJ6HBVyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwC:3MdVVmZnHBVDNUHiiQDhu0vUEbqmEYxC
Static task
static1
Behavioral task
behavioral1
Sample
807cccc21399415e085a2d46c5fef587c8627d6af8f643a50bff26b5361afb7d.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
807cccc21399415e085a2d46c5fef587c8627d6af8f643a50bff26b5361afb7d.bin
-
Size
412KB
-
MD5
66df38c6226f11fbd300a04f78e8bc1c
-
SHA1
21f2165c38a60e10f5feb2ff5511ed52c87dddf7
-
SHA256
807cccc21399415e085a2d46c5fef587c8627d6af8f643a50bff26b5361afb7d
-
SHA512
5564905c1adf80fce105444540da12e764f1d86ef98d4d3787045dc7180bf230d7c89900d906cd079b78cdb9cb45ebc6abab1d62e67eea4a9728ca8bd547773c
-
SSDEEP
6144:n2k9yK/TZmjVVzCpiceJ6HBVyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwC:3MdVVmZnHBVDNUHiiQDhu0vUEbqmEYxC
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1