General
-
Target
f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09.bin
-
Size
209KB
-
Sample
240910-2ahp7syamq
-
MD5
971c79e84ccfb7e5f00ffc71bd38f418
-
SHA1
e5c67340461d2420deb9829f8e8ec4bd11e89770
-
SHA256
f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09
-
SHA512
5062c8ffcc7e52653d2c792a4a43c0abd93b324e4ef85312e0794b20be86b754de36f37ac7e3f8289d03db3adc14f8e1f580fe171904d88a9d7eef43c40ab856
-
SSDEEP
3072:8lrPOw2jn+UbOsSOuoNS9mfqmH/4M9dVqAFTH/ZjQcZTLPq7WMQYz3wAMYGEhtrg:yzOw2jn7ysSOuoDxHZPPDUnGEhtrrc
Static task
static1
Behavioral task
behavioral1
Sample
f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09.bin
-
Size
209KB
-
MD5
971c79e84ccfb7e5f00ffc71bd38f418
-
SHA1
e5c67340461d2420deb9829f8e8ec4bd11e89770
-
SHA256
f13d346ced2a89d170c4ab8e25fef3459a4a172e9c15b533982d6846add6cf09
-
SHA512
5062c8ffcc7e52653d2c792a4a43c0abd93b324e4ef85312e0794b20be86b754de36f37ac7e3f8289d03db3adc14f8e1f580fe171904d88a9d7eef43c40ab856
-
SSDEEP
3072:8lrPOw2jn+UbOsSOuoNS9mfqmH/4M9dVqAFTH/ZjQcZTLPq7WMQYz3wAMYGEhtrg:yzOw2jn7ysSOuoDxHZPPDUnGEhtrrc
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-