General
-
Target
5dd455286348452cadb97996acd416250fbb91df34f67d16bc35340a842f972f.bin
-
Size
408KB
-
Sample
240803-13nw9a1gpf
-
MD5
1547a43ab04c01111e2ab3f748e89c28
-
SHA1
4aa88c05fbbeea677f4cf143b2f71e7445b47775
-
SHA256
5dd455286348452cadb97996acd416250fbb91df34f67d16bc35340a842f972f
-
SHA512
c0eeec36c081f63913cac2a5679ece8add4d7b706d086d2295bad24ebca6295ebbb9f205bbc2cb4f4de23498d959f1a17ab00ea7953f2db8c8218d661f97e2c8
-
SSDEEP
6144:qyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwuTLJFPFVys6jvdsdADsnO:yDNUHiiQDhu0vUEbqmEYxg/VicAoO
Static task
static1
Behavioral task
behavioral1
Sample
5dd455286348452cadb97996acd416250fbb91df34f67d16bc35340a842f972f.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.50:28899
Targets
-
-
Target
5dd455286348452cadb97996acd416250fbb91df34f67d16bc35340a842f972f.bin
-
Size
408KB
-
MD5
1547a43ab04c01111e2ab3f748e89c28
-
SHA1
4aa88c05fbbeea677f4cf143b2f71e7445b47775
-
SHA256
5dd455286348452cadb97996acd416250fbb91df34f67d16bc35340a842f972f
-
SHA512
c0eeec36c081f63913cac2a5679ece8add4d7b706d086d2295bad24ebca6295ebbb9f205bbc2cb4f4de23498d959f1a17ab00ea7953f2db8c8218d661f97e2c8
-
SSDEEP
6144:qyQDz3a12UH/aiNBkcnOxH2R30vUEbObpm8jYJAwuTLJFPFVys6jvdsdADsnO:yDNUHiiQDhu0vUEbqmEYxg/VicAoO
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1