General
-
Target
764685794f77ffde4a62409fdc278de4485172f4ed6e0f8851cdd9ab12208869.bin
-
Size
408KB
-
Sample
240803-13kjtsxblr
-
MD5
af335dd38dd5b6369ba4aa68bbbf70f5
-
SHA1
9a5c2a98b42a122c6a88502e301b7e3e9879686e
-
SHA256
764685794f77ffde4a62409fdc278de4485172f4ed6e0f8851cdd9ab12208869
-
SHA512
dec3ef73b08a9d6956be12a5d4dde0b542ee8ae96ed78f55fbef63d0911124a362a52d840d3f3917eaf1a17ccfa01ab00820db6667f3e1b9bc29d3a480976e9f
-
SSDEEP
12288:D0GVGty398BKzDNUHiiQDhu0vUEbqmEYx2:D0GA298BK3+HiiQFvUE+Jv
Static task
static1
Behavioral task
behavioral1
Sample
764685794f77ffde4a62409fdc278de4485172f4ed6e0f8851cdd9ab12208869.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
764685794f77ffde4a62409fdc278de4485172f4ed6e0f8851cdd9ab12208869.bin
-
Size
408KB
-
MD5
af335dd38dd5b6369ba4aa68bbbf70f5
-
SHA1
9a5c2a98b42a122c6a88502e301b7e3e9879686e
-
SHA256
764685794f77ffde4a62409fdc278de4485172f4ed6e0f8851cdd9ab12208869
-
SHA512
dec3ef73b08a9d6956be12a5d4dde0b542ee8ae96ed78f55fbef63d0911124a362a52d840d3f3917eaf1a17ccfa01ab00820db6667f3e1b9bc29d3a480976e9f
-
SSDEEP
12288:D0GVGty398BKzDNUHiiQDhu0vUEbqmEYx2:D0GA298BK3+HiiQFvUE+Jv
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1