General
-
Target
fa9769efb560c65bc82f1e5a46bafaefeb39fb7c3d7cdb0e9c8fdafd84d1c8ac.bin
-
Size
208KB
-
Sample
240827-1zlygstfqe
-
MD5
0c69af4bb6d98b81e02d95c34330a72f
-
SHA1
a426ee1450d970c69e269b1a740aa23e4803cdce
-
SHA256
fa9769efb560c65bc82f1e5a46bafaefeb39fb7c3d7cdb0e9c8fdafd84d1c8ac
-
SHA512
9da2b2fd0798ec1016ad26751ebaf304f82c4f83afa2b59f7028eb38ada9d935d3a00eb095324a6b719936d0b98708aac815ee8f45dff8acf271b10857091cbd
-
SSDEEP
6144:D6Se2TOurvlQwuMwxTUM2661pCNv+IhiG6JhVM29jV5d:uS9TOujlzuMwxTUkawpiJhVMUjvd
Static task
static1
Behavioral task
behavioral1
Sample
fa9769efb560c65bc82f1e5a46bafaefeb39fb7c3d7cdb0e9c8fdafd84d1c8ac.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
fa9769efb560c65bc82f1e5a46bafaefeb39fb7c3d7cdb0e9c8fdafd84d1c8ac.bin
-
Size
208KB
-
MD5
0c69af4bb6d98b81e02d95c34330a72f
-
SHA1
a426ee1450d970c69e269b1a740aa23e4803cdce
-
SHA256
fa9769efb560c65bc82f1e5a46bafaefeb39fb7c3d7cdb0e9c8fdafd84d1c8ac
-
SHA512
9da2b2fd0798ec1016ad26751ebaf304f82c4f83afa2b59f7028eb38ada9d935d3a00eb095324a6b719936d0b98708aac815ee8f45dff8acf271b10857091cbd
-
SSDEEP
6144:D6Se2TOurvlQwuMwxTUM2661pCNv+IhiG6JhVM29jV5d:uS9TOujlzuMwxTUkawpiJhVMUjvd
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-