General
-
Target
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.bin
-
Size
209KB
-
Sample
240812-11va9axdnc
-
MD5
822e7ee4c557875e804bf741dafd7ffe
-
SHA1
681615035c68c52140f026a9550ec955f76ad860
-
SHA256
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b
-
SHA512
ef82cf318c46243589f17635a5695b1b1a4ac7cb9c8be083a51360665887122fb50c60eded4fca4ef226d70493cc3e5463684b703b90429da108dacfa09bc6e1
-
SSDEEP
6144:ecUrN6yCCmo59n6VP1GIT9gVjX//oCsUe:MwbE69GkSv/oCDe
Static task
static1
Behavioral task
behavioral1
Sample
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b.bin
-
Size
209KB
-
MD5
822e7ee4c557875e804bf741dafd7ffe
-
SHA1
681615035c68c52140f026a9550ec955f76ad860
-
SHA256
3d0748f04c38649d2805562ead52bd2ca75afc5a10e160f977f2a1ad6ca21c8b
-
SHA512
ef82cf318c46243589f17635a5695b1b1a4ac7cb9c8be083a51360665887122fb50c60eded4fca4ef226d70493cc3e5463684b703b90429da108dacfa09bc6e1
-
SSDEEP
6144:ecUrN6yCCmo59n6VP1GIT9gVjX//oCsUe:MwbE69GkSv/oCDe
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-