General
-
Target
9dd4a2c7f69bb885c054ff85ed4d17e07baedc2b3d4663c3689f590d2cdb4189.bin
-
Size
283KB
-
Sample
241021-1x4qhs1epj
-
MD5
3df0f3488457efadb4c1a150151b9dbe
-
SHA1
1eb9da0f727f360c61cf9b1ac5153a6a9a307b1f
-
SHA256
9dd4a2c7f69bb885c054ff85ed4d17e07baedc2b3d4663c3689f590d2cdb4189
-
SHA512
bcd4dad4086c379aea9e09c96e058c0ffde01c0d3284587aa56ce0f928a3dc5db12ecb04e20435e5631e62bcc5943f97a875288d34bb30cf371376cf698ce63e
-
SSDEEP
6144:FPbxDjSYQdYrEQhV3/fJv87fblRoM8A5O5eIxDPX:FPZbQdYYaPfu7DjQA5O5eIxDPX
Static task
static1
Behavioral task
behavioral1
Sample
9dd4a2c7f69bb885c054ff85ed4d17e07baedc2b3d4663c3689f590d2cdb4189.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.226.105:28844
Targets
-
-
Target
9dd4a2c7f69bb885c054ff85ed4d17e07baedc2b3d4663c3689f590d2cdb4189.bin
-
Size
283KB
-
MD5
3df0f3488457efadb4c1a150151b9dbe
-
SHA1
1eb9da0f727f360c61cf9b1ac5153a6a9a307b1f
-
SHA256
9dd4a2c7f69bb885c054ff85ed4d17e07baedc2b3d4663c3689f590d2cdb4189
-
SHA512
bcd4dad4086c379aea9e09c96e058c0ffde01c0d3284587aa56ce0f928a3dc5db12ecb04e20435e5631e62bcc5943f97a875288d34bb30cf371376cf698ce63e
-
SSDEEP
6144:FPbxDjSYQdYrEQhV3/fJv87fblRoM8A5O5eIxDPX:FPZbQdYYaPfu7DjQA5O5eIxDPX
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1