General
-
Target
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719.bin
-
Size
303KB
-
Sample
240927-1zx1ravake
-
MD5
eb3f7e5389471d6576a0e83dc8d9c586
-
SHA1
9c318dd0c7b975aa234a7db6e8601132f5316bcd
-
SHA256
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719
-
SHA512
9a7193185733941c831d9333c1a35c2a27514cf5fb15b45cb92e86677e0ed0943cdec80275200a33bbfaa32167d6139ae67a687a76ccc3b928105ff6564db9a0
-
SSDEEP
6144:DzEkGt/AJKXqVrVz3vPJPVXdJxUE2pbZ7fHnsiqHt72t:pJkchbPJJxF2v7/JqHu
Static task
static1
Behavioral task
behavioral1
Sample
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719.bin
-
Size
303KB
-
MD5
eb3f7e5389471d6576a0e83dc8d9c586
-
SHA1
9c318dd0c7b975aa234a7db6e8601132f5316bcd
-
SHA256
be3c37b1f21014a616ef496db8e6e836c49d1363675695c803ca8cecf9069719
-
SHA512
9a7193185733941c831d9333c1a35c2a27514cf5fb15b45cb92e86677e0ed0943cdec80275200a33bbfaa32167d6139ae67a687a76ccc3b928105ff6564db9a0
-
SSDEEP
6144:DzEkGt/AJKXqVrVz3vPJPVXdJxUE2pbZ7fHnsiqHt72t:pJkchbPJJxF2v7/JqHu
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1