General
-
Target
d458126113d391baabad118988c314885d35b7ac13a844052154b6d804ba7c2b.bin
-
Size
278KB
-
Sample
240915-1yvh8svhjr
-
MD5
bb30eddb89f4c55f096660b85849c239
-
SHA1
e6c8ac5690c8ad063ce913f5170f9dc2d9dfa030
-
SHA256
d458126113d391baabad118988c314885d35b7ac13a844052154b6d804ba7c2b
-
SHA512
d8b30f5b08cfe939ac8392b9d5bffb20f91f7a15923086d949afebc881c861540dba21964fb2fa7dd5db57524ad343fba0430a75d43e52503812847c0ee5c717
-
SSDEEP
6144:4vcDLKOppnfRhzzXHK6XIG/n5DnR2q3l+XkAbYMVE0Q1pT292c:40DFppnf/zbHr5zccl+XvbYMoO92c
Static task
static1
Behavioral task
behavioral1
Sample
d458126113d391baabad118988c314885d35b7ac13a844052154b6d804ba7c2b.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
d458126113d391baabad118988c314885d35b7ac13a844052154b6d804ba7c2b.bin
-
Size
278KB
-
MD5
bb30eddb89f4c55f096660b85849c239
-
SHA1
e6c8ac5690c8ad063ce913f5170f9dc2d9dfa030
-
SHA256
d458126113d391baabad118988c314885d35b7ac13a844052154b6d804ba7c2b
-
SHA512
d8b30f5b08cfe939ac8392b9d5bffb20f91f7a15923086d949afebc881c861540dba21964fb2fa7dd5db57524ad343fba0430a75d43e52503812847c0ee5c717
-
SSDEEP
6144:4vcDLKOppnfRhzzXHK6XIG/n5DnR2q3l+XkAbYMVE0Q1pT292c:40DFppnf/zbHr5zccl+XvbYMoO92c
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1