General
-
Target
0c6ec5aa41313b7551cb9fc983022093f3a2dd6ab34768d31a8445f20222e760.bin
-
Size
208KB
-
Sample
240829-1xq5esvgrr
-
MD5
bd8b3de741852266371f9a481bd6f010
-
SHA1
367be59847f89bf82f0122a766140d6d982fd8bb
-
SHA256
0c6ec5aa41313b7551cb9fc983022093f3a2dd6ab34768d31a8445f20222e760
-
SHA512
7524717de064ea83b7b7305ce932a22f8e1463a74390ad84107d4ab4340bee3b451132eabdface71ad612881e0d6b3f0705d1b7401ab0acc20a6fd6bcaad602c
-
SSDEEP
6144:IRSK//plo1cfNuEEOndbUhnoPV8srF4HSBMlcI6yFeHT3A:peA1Sbdb2KqsA7leyFez3A
Static task
static1
Behavioral task
behavioral1
Sample
0c6ec5aa41313b7551cb9fc983022093f3a2dd6ab34768d31a8445f20222e760.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
0c6ec5aa41313b7551cb9fc983022093f3a2dd6ab34768d31a8445f20222e760.bin
-
Size
208KB
-
MD5
bd8b3de741852266371f9a481bd6f010
-
SHA1
367be59847f89bf82f0122a766140d6d982fd8bb
-
SHA256
0c6ec5aa41313b7551cb9fc983022093f3a2dd6ab34768d31a8445f20222e760
-
SHA512
7524717de064ea83b7b7305ce932a22f8e1463a74390ad84107d4ab4340bee3b451132eabdface71ad612881e0d6b3f0705d1b7401ab0acc20a6fd6bcaad602c
-
SSDEEP
6144:IRSK//plo1cfNuEEOndbUhnoPV8srF4HSBMlcI6yFeHT3A:peA1Sbdb2KqsA7leyFez3A
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-