General
-
Target
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d.bin
-
Size
278KB
-
Sample
240809-152k5asamm
-
MD5
0037b3010547049e04622c8d22b27e3c
-
SHA1
f81e87d18ee7563b3c8833fea1ad7598b3bd16db
-
SHA256
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d
-
SHA512
b4511787f8e60cb10b37eaa4107db1e8a139b9602e52963cbbe49514e788bbe91d39471e20c2f181532c7ae3d7cf233400a245e952cb1a038168a33d6a96817c
-
SSDEEP
6144:5btxkb/n0Kv5aaPDY1TTGZYAE5YO7p5N2zW0VbJkZV/dYkt0RB:5bDkrn0W5aa7oT4IlaXJkD/dYS0L
Static task
static1
Behavioral task
behavioral1
Sample
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d.bin
-
Size
278KB
-
MD5
0037b3010547049e04622c8d22b27e3c
-
SHA1
f81e87d18ee7563b3c8833fea1ad7598b3bd16db
-
SHA256
40791f8a4812b5b5bec01d3736e7b30335a4e09db6221db6a89713870a5e0a0d
-
SHA512
b4511787f8e60cb10b37eaa4107db1e8a139b9602e52963cbbe49514e788bbe91d39471e20c2f181532c7ae3d7cf233400a245e952cb1a038168a33d6a96817c
-
SSDEEP
6144:5btxkb/n0Kv5aaPDY1TTGZYAE5YO7p5N2zW0VbJkZV/dYkt0RB:5bDkrn0W5aa7oT4IlaXJkD/dYS0L
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1