General
-
Target
e947985fe1078a95be7bb40da4c0846bb5b91c75944a24c71700bbe54921fd41.bin
-
Size
209KB
-
Sample
240906-1zwspazfrq
-
MD5
d2d333c2a502dff8194b1d582e85985d
-
SHA1
c9c202c54c8a02d8a3c03b1fc0f86c9432cdc7d3
-
SHA256
e947985fe1078a95be7bb40da4c0846bb5b91c75944a24c71700bbe54921fd41
-
SHA512
6396000b04c040f9b344b41b9c18a69d43ba3c375ef1b5a88d8f7e92db8a819c5e70bcac4f23fdda28afd5820cdeec7831750ffea61a3ac188b0518dd4efe6eb
-
SSDEEP
3072:17OSDRrDFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpca0IYxIldc:1JRrSkHtakQYR9WXuPno/7d2VDmKc
Static task
static1
Behavioral task
behavioral1
Sample
e947985fe1078a95be7bb40da4c0846bb5b91c75944a24c71700bbe54921fd41.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
e947985fe1078a95be7bb40da4c0846bb5b91c75944a24c71700bbe54921fd41.bin
-
Size
209KB
-
MD5
d2d333c2a502dff8194b1d582e85985d
-
SHA1
c9c202c54c8a02d8a3c03b1fc0f86c9432cdc7d3
-
SHA256
e947985fe1078a95be7bb40da4c0846bb5b91c75944a24c71700bbe54921fd41
-
SHA512
6396000b04c040f9b344b41b9c18a69d43ba3c375ef1b5a88d8f7e92db8a819c5e70bcac4f23fdda28afd5820cdeec7831750ffea61a3ac188b0518dd4efe6eb
-
SSDEEP
3072:17OSDRrDFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpca0IYxIldc:1JRrSkHtakQYR9WXuPno/7d2VDmKc
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-