General
-
Target
75659f46687c865624bffc139025feb0444e00b679c6e23eb8331c554f9b6799.bin
-
Size
278KB
-
Sample
240902-1yx95azbna
-
MD5
01898cf4606c3e6b454b09fc74ca99f1
-
SHA1
556af31dae89363f02c5969d5b02fcc03e20d152
-
SHA256
75659f46687c865624bffc139025feb0444e00b679c6e23eb8331c554f9b6799
-
SHA512
4f9d3e0e67625c5390aeca5f047fa0d0eb4a50a77e51dd40cc79f18deb9003a1595ee680751482d4db5c1b0eb9ff1f4fca1b339506bdae568559e84d028f2a82
-
SSDEEP
6144:J7Q5yAscTZqA5lCCdpy4LsFId/GmL21/pkp/yqFkkZsfx:J05yAsc9F5lRdg221/+pLFQ5
Static task
static1
Behavioral task
behavioral1
Sample
75659f46687c865624bffc139025feb0444e00b679c6e23eb8331c554f9b6799.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
75659f46687c865624bffc139025feb0444e00b679c6e23eb8331c554f9b6799.bin
-
Size
278KB
-
MD5
01898cf4606c3e6b454b09fc74ca99f1
-
SHA1
556af31dae89363f02c5969d5b02fcc03e20d152
-
SHA256
75659f46687c865624bffc139025feb0444e00b679c6e23eb8331c554f9b6799
-
SHA512
4f9d3e0e67625c5390aeca5f047fa0d0eb4a50a77e51dd40cc79f18deb9003a1595ee680751482d4db5c1b0eb9ff1f4fca1b339506bdae568559e84d028f2a82
-
SSDEEP
6144:J7Q5yAscTZqA5lCCdpy4LsFId/GmL21/pkp/yqFkkZsfx:J05yAsc9F5lRdg221/+pLFQ5
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-