General
-
Target
d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856.bin
-
Size
209KB
-
Sample
240918-1yxctsvgmg
-
MD5
abd5d60bef35d0c9e3de4684475bbca4
-
SHA1
3b54c9f93813fe434b774cd24dd3c6fca9b258c3
-
SHA256
d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856
-
SHA512
d1bb26f9837b0582ec71ca2777735a6fc90492160bb6aada031a41e074876563f97dcc4a02e5ce7f40b55b4a5143a79625a5410fbd44e85fdf1e22e7c70acf26
-
SSDEEP
3072:l/SnsWhVENmFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpQr6wMl7e:lwEZkHtakQYR9WXuPno/7d2VUlWe
Static task
static1
Behavioral task
behavioral1
Sample
d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856.bin
-
Size
209KB
-
MD5
abd5d60bef35d0c9e3de4684475bbca4
-
SHA1
3b54c9f93813fe434b774cd24dd3c6fca9b258c3
-
SHA256
d81cfc062a155f874647364c87c0371875af88c75b971406cfd517b4b7e21856
-
SHA512
d1bb26f9837b0582ec71ca2777735a6fc90492160bb6aada031a41e074876563f97dcc4a02e5ce7f40b55b4a5143a79625a5410fbd44e85fdf1e22e7c70acf26
-
SSDEEP
3072:l/SnsWhVENmFPrGB3kcotakQYqKhb9WXu3fnzTjMXf1d3AGBbH92rhFpQr6wMl7e:lwEZkHtakQYR9WXuPno/7d2VUlWe
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-