General
-
Target
bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16.bin
-
Size
282KB
-
Sample
241102-1zmj1sxakb
-
MD5
da2e2bc204da710420d4c8616cb2086b
-
SHA1
b69834bb3c54c0993efcca01d52c080ca103e531
-
SHA256
bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16
-
SHA512
aa8381928e347a7402531f1b7b9b58ca0255beeaf2f248ed3511929eda978f1efd582f34fe28489a21086c370d7adade413bbf42a3c4d602ed07528ce8cac357
-
SSDEEP
6144:AtNor/7huAoogmp6uIZkpBcxqjpDYypUt2YM7o5jnqoPZP:4NQSogO6H0xYkcmoscP
Static task
static1
Behavioral task
behavioral1
Sample
bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://91.204.226.105:28844
Targets
-
-
Target
bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16.bin
-
Size
282KB
-
MD5
da2e2bc204da710420d4c8616cb2086b
-
SHA1
b69834bb3c54c0993efcca01d52c080ca103e531
-
SHA256
bcc9e6009bc4f79e809d15c12f39d081d26de4cc0b1b2ec3b2deefa2a52f2e16
-
SHA512
aa8381928e347a7402531f1b7b9b58ca0255beeaf2f248ed3511929eda978f1efd582f34fe28489a21086c370d7adade413bbf42a3c4d602ed07528ce8cac357
-
SSDEEP
6144:AtNor/7huAoogmp6uIZkpBcxqjpDYypUt2YM7o5jnqoPZP:4NQSogO6H0xYkcmoscP
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
2