General
-
Target
b89c51c175eb4ee9401f1f0c6da7a908080662a151cf4cc077870a1ac2ebd4a6.bin
-
Size
209KB
-
Sample
241003-2aznqazejm
-
MD5
0e6a7306338963f31af7828cdc902668
-
SHA1
c4a64254818fbc8e87d27690f9f331144b275a45
-
SHA256
b89c51c175eb4ee9401f1f0c6da7a908080662a151cf4cc077870a1ac2ebd4a6
-
SHA512
5016adf5dac3952ea6ae8400a8be51a2bc845326094c32256edf19efe57d22d22d3bbcaec640e43f9fef9fac3fc7a9b99269eb1406cecbb989b749260825001f
-
SSDEEP
3072:tKn9g7CCh4l5SakwpW7KNIOnZstPASOuoNS9mfqmH/4M9dVqAFTH/ZjQcZTLPq7r:4gx0WpKNI6St4SOuoDxHZPPDUnGEhtn
Static task
static1
Behavioral task
behavioral1
Sample
b89c51c175eb4ee9401f1f0c6da7a908080662a151cf4cc077870a1ac2ebd4a6.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
b89c51c175eb4ee9401f1f0c6da7a908080662a151cf4cc077870a1ac2ebd4a6.bin
-
Size
209KB
-
MD5
0e6a7306338963f31af7828cdc902668
-
SHA1
c4a64254818fbc8e87d27690f9f331144b275a45
-
SHA256
b89c51c175eb4ee9401f1f0c6da7a908080662a151cf4cc077870a1ac2ebd4a6
-
SHA512
5016adf5dac3952ea6ae8400a8be51a2bc845326094c32256edf19efe57d22d22d3bbcaec640e43f9fef9fac3fc7a9b99269eb1406cecbb989b749260825001f
-
SSDEEP
3072:tKn9g7CCh4l5SakwpW7KNIOnZstPASOuoNS9mfqmH/4M9dVqAFTH/ZjQcZTLPq7r:4gx0WpKNI6St4SOuoDxHZPPDUnGEhtn
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-