General
-
Target
0ded09474f4229ce04f413875fadef5b357e9941321dccdc28022818deee8908.bin
-
Size
209KB
-
Sample
241006-13mn7aydqk
-
MD5
12090c7feefbbccb01e67930b1c27f78
-
SHA1
745acbe91395e10c71e7d2c2ac944a8eedfccb7a
-
SHA256
0ded09474f4229ce04f413875fadef5b357e9941321dccdc28022818deee8908
-
SHA512
cb8b259e6bea287ab660dc7deb07c16c5b5de14519a3ccd03ffcacb06bfe81e4287e07936a90e9c6e29e10ae3e97077bbedef230ef613a0e6f76e182702b8929
-
SSDEEP
6144:goSY6FBI+r3VTOeIGH3nPH/yps0ozi40hmj2vgxStIu9PEN:gdzIo3VTOeIGXd9imjM5tN9PEN
Static task
static1
Behavioral task
behavioral1
Sample
0ded09474f4229ce04f413875fadef5b357e9941321dccdc28022818deee8908.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
0ded09474f4229ce04f413875fadef5b357e9941321dccdc28022818deee8908.bin
-
Size
209KB
-
MD5
12090c7feefbbccb01e67930b1c27f78
-
SHA1
745acbe91395e10c71e7d2c2ac944a8eedfccb7a
-
SHA256
0ded09474f4229ce04f413875fadef5b357e9941321dccdc28022818deee8908
-
SHA512
cb8b259e6bea287ab660dc7deb07c16c5b5de14519a3ccd03ffcacb06bfe81e4287e07936a90e9c6e29e10ae3e97077bbedef230ef613a0e6f76e182702b8929
-
SSDEEP
6144:goSY6FBI+r3VTOeIGH3nPH/yps0ozi40hmj2vgxStIu9PEN:gdzIo3VTOeIGXd9imjM5tN9PEN
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-