General
-
Target
0fb28eea31e9ac31b0fb439d4691f07c5c3d1397271ebdeddb1d3dca5a57249e.bin
-
Size
283KB
-
Sample
240827-1zl89atfqg
-
MD5
05659e5201371ee796bcd9f443a402e6
-
SHA1
9ab20ea7933bb1719ac5650c0e11df8d6fdc9a24
-
SHA256
0fb28eea31e9ac31b0fb439d4691f07c5c3d1397271ebdeddb1d3dca5a57249e
-
SHA512
d0040abb4a4a7e176b18de33cafbbb0a1bf1126f4cdfe94f3a75334a53d702a034d0eb82e1d4d8c12dd0d22c0e580b5a807116441c4c6e6ddde7c8a2a5f1e132
-
SSDEEP
6144:BaGsF07jH6+ry97+V05Qrv+X8tea3NziNPuh7adEFCmLeJkS:jU07T6+67+a5Ba1zdh+SFVeJkS
Static task
static1
Behavioral task
behavioral1
Sample
0fb28eea31e9ac31b0fb439d4691f07c5c3d1397271ebdeddb1d3dca5a57249e.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
0fb28eea31e9ac31b0fb439d4691f07c5c3d1397271ebdeddb1d3dca5a57249e.bin
-
Size
283KB
-
MD5
05659e5201371ee796bcd9f443a402e6
-
SHA1
9ab20ea7933bb1719ac5650c0e11df8d6fdc9a24
-
SHA256
0fb28eea31e9ac31b0fb439d4691f07c5c3d1397271ebdeddb1d3dca5a57249e
-
SHA512
d0040abb4a4a7e176b18de33cafbbb0a1bf1126f4cdfe94f3a75334a53d702a034d0eb82e1d4d8c12dd0d22c0e580b5a807116441c4c6e6ddde7c8a2a5f1e132
-
SSDEEP
6144:BaGsF07jH6+ry97+V05Qrv+X8tea3NziNPuh7adEFCmLeJkS:jU07T6+67+a5Ba1zdh+SFVeJkS
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-