General
-
Target
356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f.bin
-
Size
278KB
-
Sample
241002-14vfestcjb
-
MD5
fba1aa4b732025b5de58f26be4f42fd1
-
SHA1
aba2145d4468c499ad7efb9507ab0fc349370a9c
-
SHA256
356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f
-
SHA512
96beeece51b0611e694d5d073f5d5687e7868be16bb87206706c255e298f84a7b177f153a60db3dea7a452507290e13affce62a5a831ad4104d59cdd784bd5ac
-
SSDEEP
6144:gV/tI/xyhBq3AFbm0JjZYutNbK5W0K8En0gImyCbYb8p:Vx4BqwBDJrtU5qrymyCo8p
Static task
static1
Behavioral task
behavioral1
Sample
356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f.bin
-
Size
278KB
-
MD5
fba1aa4b732025b5de58f26be4f42fd1
-
SHA1
aba2145d4468c499ad7efb9507ab0fc349370a9c
-
SHA256
356d5c3b62d51d3fb6fa9ca25246f224f9fcfb1de71bb1c456c9da22014c187f
-
SHA512
96beeece51b0611e694d5d073f5d5687e7868be16bb87206706c255e298f84a7b177f153a60db3dea7a452507290e13affce62a5a831ad4104d59cdd784bd5ac
-
SSDEEP
6144:gV/tI/xyhBq3AFbm0JjZYutNbK5W0K8En0gImyCbYb8p:Vx4BqwBDJrtU5qrymyCo8p
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-