General
-
Target
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3.bin
-
Size
206KB
-
Sample
240912-12rlraybld
-
MD5
8e9c69829d8badb5fcb74d5ca061a488
-
SHA1
9646a17e45267370d463d2d0995dc7e7412d223d
-
SHA256
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3
-
SHA512
f0a5053897884ed74bf38a14bc9f297b070791c46f5341e82dd253f6fd57f3ae9933ad5bb2130c0ebe32a1b336b511ec3a51a5c15f6b38c9d8ae70356edb56b0
-
SSDEEP
3072:YxfCKqHbqJxzB5mrMR3BoKY7oupboIS0phUVCUDhBYMXasFYvXwvVQNPbfDBMipj:YK7qf483B7Y7bczKvFTDn16PsgONBr
Static task
static1
Behavioral task
behavioral1
Sample
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3.bin
-
Size
206KB
-
MD5
8e9c69829d8badb5fcb74d5ca061a488
-
SHA1
9646a17e45267370d463d2d0995dc7e7412d223d
-
SHA256
590a71061ceef8bdc67a9f7b01f4babc2e07298c7c5a55423825e117a827a0f3
-
SHA512
f0a5053897884ed74bf38a14bc9f297b070791c46f5341e82dd253f6fd57f3ae9933ad5bb2130c0ebe32a1b336b511ec3a51a5c15f6b38c9d8ae70356edb56b0
-
SSDEEP
3072:YxfCKqHbqJxzB5mrMR3BoKY7oupboIS0phUVCUDhBYMXasFYvXwvVQNPbfDBMipj:YK7qf483B7Y7bczKvFTDn16PsgONBr
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1