General
-
Target
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.bin
-
Size
278KB
-
Sample
241004-1ybq5atapf
-
MD5
e98a480465dfe89e0c22d68142421432
-
SHA1
2abf15e526b3f5610a06d1e3e73ce0bacf48442f
-
SHA256
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84
-
SHA512
8bcebbd304fe51deb68d1214dd309ed9a841c3dcf0d2f8c96bfb4e4452a9044d4a0269eb821be35b07754e236d13cbea5f86c7dbb49b5afc8c5856ceb400c12f
-
SSDEEP
6144:vZSF29iBhO2vzeHhxnVov5twa2CUE14juWjXXU9PorPHiEBXwlY:voFaI42vKHhxnWv5ua2Z9hXsPorRXwq
Static task
static1
Behavioral task
behavioral1
Sample
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84.bin
-
Size
278KB
-
MD5
e98a480465dfe89e0c22d68142421432
-
SHA1
2abf15e526b3f5610a06d1e3e73ce0bacf48442f
-
SHA256
dae8655fd2906f05ffb701349428c1b20e68019233d4ccd468266440b003ad84
-
SHA512
8bcebbd304fe51deb68d1214dd309ed9a841c3dcf0d2f8c96bfb4e4452a9044d4a0269eb821be35b07754e236d13cbea5f86c7dbb49b5afc8c5856ceb400c12f
-
SSDEEP
6144:vZSF29iBhO2vzeHhxnVov5twa2CUE14juWjXXU9PorPHiEBXwlY:voFaI42vKHhxnWv5ua2Z9hXsPorRXwq
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1