General
-
Target
eb9394a299a2e362ab7ceed590412fb6bcf01d33cfc87b731c00ac99725fb538.bin
-
Size
278KB
-
Sample
240927-1zwspavakb
-
MD5
34a5af4c64ad54b415a75c1f23ed465a
-
SHA1
531c6c6afd4c6e03bbe969f0c76bede3efea2728
-
SHA256
eb9394a299a2e362ab7ceed590412fb6bcf01d33cfc87b731c00ac99725fb538
-
SHA512
4c6a00d8cd0a92f374c6e1652ad701a41857765632d0502dce6371f6d48ec1c9d362535eab4b44c77c8d90e5d0598a67ebe4b6ee8b99fd03fd53308404f52dbb
-
SSDEEP
6144:mSd9gIXihVbD3L6BwQZBJ37tDhWC+q6FrfMmGAB:mJIXihVbD3+BwkBFtf366mV
Static task
static1
Behavioral task
behavioral1
Sample
eb9394a299a2e362ab7ceed590412fb6bcf01d33cfc87b731c00ac99725fb538.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
eb9394a299a2e362ab7ceed590412fb6bcf01d33cfc87b731c00ac99725fb538.bin
-
Size
278KB
-
MD5
34a5af4c64ad54b415a75c1f23ed465a
-
SHA1
531c6c6afd4c6e03bbe969f0c76bede3efea2728
-
SHA256
eb9394a299a2e362ab7ceed590412fb6bcf01d33cfc87b731c00ac99725fb538
-
SHA512
4c6a00d8cd0a92f374c6e1652ad701a41857765632d0502dce6371f6d48ec1c9d362535eab4b44c77c8d90e5d0598a67ebe4b6ee8b99fd03fd53308404f52dbb
-
SSDEEP
6144:mSd9gIXihVbD3L6BwQZBJ37tDhWC+q6FrfMmGAB:mJIXihVbD3+BwkBFtf366mV
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1