General
-
Target
c295c25e6fd8963b2a77e6f4a0a4f9c48703763297276b7e9ad2b3f3ed672850.bin
-
Size
209KB
-
Sample
241027-1x9a1a1lhq
-
MD5
ec0115a2d43efa9caa8e20ffab746cc6
-
SHA1
58da04b774e7602cd16dd4d8fb718bee9b89e7b2
-
SHA256
c295c25e6fd8963b2a77e6f4a0a4f9c48703763297276b7e9ad2b3f3ed672850
-
SHA512
d13be482823a142ba22280a1cd6e756ab07a3c99d9b509a9bbd8e7fa12eddc5d677dfce2e6f2cb7a012a386ace598b463ff4423ad3132cfa9c0272e52ff4d0ae
-
SSDEEP
6144:jSnwVofClI+u5mUqbTVm94FNIdlebxFJY:unKofCFu8U4TAivIdIbxFJY
Static task
static1
Behavioral task
behavioral1
Sample
c295c25e6fd8963b2a77e6f4a0a4f9c48703763297276b7e9ad2b3f3ed672850.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.226.105:28844
Targets
-
-
Target
c295c25e6fd8963b2a77e6f4a0a4f9c48703763297276b7e9ad2b3f3ed672850.bin
-
Size
209KB
-
MD5
ec0115a2d43efa9caa8e20ffab746cc6
-
SHA1
58da04b774e7602cd16dd4d8fb718bee9b89e7b2
-
SHA256
c295c25e6fd8963b2a77e6f4a0a4f9c48703763297276b7e9ad2b3f3ed672850
-
SHA512
d13be482823a142ba22280a1cd6e756ab07a3c99d9b509a9bbd8e7fa12eddc5d677dfce2e6f2cb7a012a386ace598b463ff4423ad3132cfa9c0272e52ff4d0ae
-
SSDEEP
6144:jSnwVofClI+u5mUqbTVm94FNIdlebxFJY:unKofCFu8U4TAivIdIbxFJY
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests changing the default SMS application.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
2