General
-
Target
e0dbd7e7b44d55e3c59c86dc24a81818b0e0bd8bea99fe0f32c75b1f13b95177.bin
-
Size
277KB
-
Sample
241022-128v2ayfmq
-
MD5
88cdb8d2f55835280874ad822434309d
-
SHA1
2794d7792cb3913cf3e88ec80a492e8f0289401e
-
SHA256
e0dbd7e7b44d55e3c59c86dc24a81818b0e0bd8bea99fe0f32c75b1f13b95177
-
SHA512
7a7d1c6ae5c92eea09c7344bb634e91d031061351184e5652f589e70275d9fea7549e216fdb7760f889f56bfe25363ed269f9b639508f128135623746a3b7711
-
SSDEEP
6144:nlXkAbYMVE0Q1pT2kyi6npnfRhzzXHK6XIG/n5DnR2q3lEg56V:lXvbYMoOfiepnf/zbHr5zcclG
Static task
static1
Behavioral task
behavioral1
Sample
e0dbd7e7b44d55e3c59c86dc24a81818b0e0bd8bea99fe0f32c75b1f13b95177.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.226.105:28844
Targets
-
-
Target
e0dbd7e7b44d55e3c59c86dc24a81818b0e0bd8bea99fe0f32c75b1f13b95177.bin
-
Size
277KB
-
MD5
88cdb8d2f55835280874ad822434309d
-
SHA1
2794d7792cb3913cf3e88ec80a492e8f0289401e
-
SHA256
e0dbd7e7b44d55e3c59c86dc24a81818b0e0bd8bea99fe0f32c75b1f13b95177
-
SHA512
7a7d1c6ae5c92eea09c7344bb634e91d031061351184e5652f589e70275d9fea7549e216fdb7760f889f56bfe25363ed269f9b639508f128135623746a3b7711
-
SSDEEP
6144:nlXkAbYMVE0Q1pT2kyi6npnfRhzzXHK6XIG/n5DnR2q3lEg56V:lXvbYMoOfiepnf/zbHr5zcclG
-
XLoader payload
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1