General
-
Target
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4.bin
-
Size
392KB
-
Sample
241020-13y28ashla
-
MD5
776797edb254a6a7a251827df2c08e4d
-
SHA1
41a20c6a4ba74a10ee00c24fdf5b225dc7394800
-
SHA256
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4
-
SHA512
d75efaf94feee095bf3805e0f17e1e92e15fe46863ec57ab67220e5fa9c8248719f9e75c98e8aa0b879bba6c474aff84663bcc3e74ea28bd2414529332c9ef7d
-
SSDEEP
12288:O+npLz3Lasy3R7xzHe/QOaj4F3CmFdH9u0TNKAFlD98rxL:7n5z3NG7NHe/aj+jHRZHlsxL
Static task
static1
Behavioral task
behavioral1
Sample
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4.bin
-
Size
392KB
-
MD5
776797edb254a6a7a251827df2c08e4d
-
SHA1
41a20c6a4ba74a10ee00c24fdf5b225dc7394800
-
SHA256
7de708970b8ac009cd40f965750f33d8b4ff414eb4002e680641506043bee9b4
-
SHA512
d75efaf94feee095bf3805e0f17e1e92e15fe46863ec57ab67220e5fa9c8248719f9e75c98e8aa0b879bba6c474aff84663bcc3e74ea28bd2414529332c9ef7d
-
SSDEEP
12288:O+npLz3Lasy3R7xzHe/QOaj4F3CmFdH9u0TNKAFlD98rxL:7n5z3NG7NHe/aj+jHRZHlsxL
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1