General
-
Target
bea9c0da58ad56883a563a72ea68c79bf4aaf985b73636d4d233af2e59b94f20.bin
-
Size
208KB
-
Sample
241003-19ayzatbnh
-
MD5
edc961a10ae151a1cd107eadc78993d2
-
SHA1
8d11411b8bda3254834e5b5a4b91215664cdade0
-
SHA256
bea9c0da58ad56883a563a72ea68c79bf4aaf985b73636d4d233af2e59b94f20
-
SHA512
97719da6dc449f370c13612bcb47524cdea2c07e333a43b420958fbc5be5ac16fe41fc240aaff21eafc25e2b953be561eb93ef3dd94cd248b4f59ebc6aa2a451
-
SSDEEP
6144:FZhQTDpqnJ9WlNtIy+e6m0CmOC3D4YTwXj1TYudlf:FZS3pqJ9Zm0d38YKCudlf
Static task
static1
Behavioral task
behavioral1
Sample
bea9c0da58ad56883a563a72ea68c79bf4aaf985b73636d4d233af2e59b94f20.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
bea9c0da58ad56883a563a72ea68c79bf4aaf985b73636d4d233af2e59b94f20.bin
-
Size
208KB
-
MD5
edc961a10ae151a1cd107eadc78993d2
-
SHA1
8d11411b8bda3254834e5b5a4b91215664cdade0
-
SHA256
bea9c0da58ad56883a563a72ea68c79bf4aaf985b73636d4d233af2e59b94f20
-
SHA512
97719da6dc449f370c13612bcb47524cdea2c07e333a43b420958fbc5be5ac16fe41fc240aaff21eafc25e2b953be561eb93ef3dd94cd248b4f59ebc6aa2a451
-
SSDEEP
6144:FZhQTDpqnJ9WlNtIy+e6m0CmOC3D4YTwXj1TYudlf:FZS3pqJ9Zm0d38YKCudlf
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-