General
-
Target
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2.bin
-
Size
431KB
-
Sample
240910-1yvh8syfqg
-
MD5
cb08f0bc426b77ab165bab150bb3b78a
-
SHA1
0195824cee5f7de6621fb5708f1c8eb40085b684
-
SHA256
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2
-
SHA512
61ada0ea81e1a438fbe5a88efe9302aa325d6281e0e1080c2326c82a25675ecaf99c88d63a41975675d0a448fd70cf8229be6a555f83fd9d494721172ffe8431
-
SSDEEP
12288:7HRJ3N/Qjwv7zK1rains2F+u4kaa9FgILmxmvdVvlb7Vb+:brdewTzK17ns24kZGAtB+
Static task
static1
Behavioral task
behavioral1
Sample
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2.bin
-
Size
431KB
-
MD5
cb08f0bc426b77ab165bab150bb3b78a
-
SHA1
0195824cee5f7de6621fb5708f1c8eb40085b684
-
SHA256
12f29c491b815fc70182e77301d83867efa0b53bda0fd9358e676d735e4147e2
-
SHA512
61ada0ea81e1a438fbe5a88efe9302aa325d6281e0e1080c2326c82a25675ecaf99c88d63a41975675d0a448fd70cf8229be6a555f83fd9d494721172ffe8431
-
SSDEEP
12288:7HRJ3N/Qjwv7zK1rains2F+u4kaa9FgILmxmvdVvlb7Vb+:brdewTzK17ns24kZGAtB+
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1