General
-
Target
dd76506e4ef6ba969e76d6709dfff40d866e99f8e077947767fc9cc38a097dc2.bin
-
Size
208KB
-
Sample
240812-11214ashjk
-
MD5
cfa3a62a33aae165095a43890e35de05
-
SHA1
8dadc69d015425d78890a6268d6501937b389d23
-
SHA256
dd76506e4ef6ba969e76d6709dfff40d866e99f8e077947767fc9cc38a097dc2
-
SHA512
97770e6f7debf7d1b985ea4218137017ff6850ddaac9938aff5a0748417a7ae6c3e3349199236b4d9870e480cbfdd0e15b1fa9c4bcbe5abc12c3c50173606a6a
-
SSDEEP
6144:+RLqU0qQwuMwxTUM2661pCNv+IhiG6J+15:+Zr7zuMwxTUkawpiJ+15
Static task
static1
Behavioral task
behavioral1
Sample
dd76506e4ef6ba969e76d6709dfff40d866e99f8e077947767fc9cc38a097dc2.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
dd76506e4ef6ba969e76d6709dfff40d866e99f8e077947767fc9cc38a097dc2.bin
-
Size
208KB
-
MD5
cfa3a62a33aae165095a43890e35de05
-
SHA1
8dadc69d015425d78890a6268d6501937b389d23
-
SHA256
dd76506e4ef6ba969e76d6709dfff40d866e99f8e077947767fc9cc38a097dc2
-
SHA512
97770e6f7debf7d1b985ea4218137017ff6850ddaac9938aff5a0748417a7ae6c3e3349199236b4d9870e480cbfdd0e15b1fa9c4bcbe5abc12c3c50173606a6a
-
SSDEEP
6144:+RLqU0qQwuMwxTUM2661pCNv+IhiG6J+15:+Zr7zuMwxTUkawpiJ+15
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-