General
-
Target
4a40fdcaad9622f7ac1cff6b68c2452d32678ac557128f2d9254ab608d60afb2.bin
-
Size
209KB
-
Sample
240910-1xmf8sxdmr
-
MD5
4a2b463adb28dfcaee7632442b49abb9
-
SHA1
e8b626bcd5021b17d3ec24653e2bee89f41275ce
-
SHA256
4a40fdcaad9622f7ac1cff6b68c2452d32678ac557128f2d9254ab608d60afb2
-
SHA512
c9cc381e5ee7fe73b50fe5be87c2f1ea5106f0e28c0a205a33eafcb4a5eb7abc765f726852a49abd079dc8081d5757ce6fdd1c43b2b1080d135f82129387e16f
-
SSDEEP
3072:gpHUR3DMOcha3mJoB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFppEl9S2C:1RQa3SikHtakQYR9WXuPno/7d2Vf7PF
Static task
static1
Behavioral task
behavioral1
Sample
4a40fdcaad9622f7ac1cff6b68c2452d32678ac557128f2d9254ab608d60afb2.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
4a40fdcaad9622f7ac1cff6b68c2452d32678ac557128f2d9254ab608d60afb2.bin
-
Size
209KB
-
MD5
4a2b463adb28dfcaee7632442b49abb9
-
SHA1
e8b626bcd5021b17d3ec24653e2bee89f41275ce
-
SHA256
4a40fdcaad9622f7ac1cff6b68c2452d32678ac557128f2d9254ab608d60afb2
-
SHA512
c9cc381e5ee7fe73b50fe5be87c2f1ea5106f0e28c0a205a33eafcb4a5eb7abc765f726852a49abd079dc8081d5757ce6fdd1c43b2b1080d135f82129387e16f
-
SSDEEP
3072:gpHUR3DMOcha3mJoB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFppEl9S2C:1RQa3SikHtakQYR9WXuPno/7d2Vf7PF
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-