General
-
Target
3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf.bin
-
Size
274KB
-
Sample
241005-11jjrayfmh
-
MD5
3b9ab71396f25e72573dff07575f0a32
-
SHA1
1eabc6e8b18ea90b9b2658950e9b958be34cc774
-
SHA256
3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf
-
SHA512
84b129c9fd0787ff2b842db1d8e0d9124f4208f9959fa96a8f13b46d9cd23e0760df0984a9681d2adbf606e9af6e5391c9387ab1ae49a1c28e79d3f8f266cadd
-
SSDEEP
6144:IQNGIdF03azkj+x+xLAPZ65jg1RlE4w3muxxwMTAnIuFL:IAG6KgkjxA65jgNwWujMnIuFL
Static task
static1
Behavioral task
behavioral1
Sample
3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf.bin
-
Size
274KB
-
MD5
3b9ab71396f25e72573dff07575f0a32
-
SHA1
1eabc6e8b18ea90b9b2658950e9b958be34cc774
-
SHA256
3d80620be7715777dd2b1fdc97091cbf12dccba9e942857d31f3ab7a276539cf
-
SHA512
84b129c9fd0787ff2b842db1d8e0d9124f4208f9959fa96a8f13b46d9cd23e0760df0984a9681d2adbf606e9af6e5391c9387ab1ae49a1c28e79d3f8f266cadd
-
SSDEEP
6144:IQNGIdF03azkj+x+xLAPZ65jg1RlE4w3muxxwMTAnIuFL:IAG6KgkjxA65jgNwWujMnIuFL
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-