General
-
Target
a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.bin
-
Size
209KB
-
Sample
241106-12zx5ayfqa
-
MD5
b37cc999ebecaa5d3b80d0e034cf39cc
-
SHA1
8788f525dc833cf93df087949e47e8ec50957f94
-
SHA256
a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85
-
SHA512
5a01e1035b7dae8f7cf047f1b1318414f3c999a7522959091fff8b2bec1390be01d3f4a98bc55c770c05afef83678534942c938c2a22167dbef2a93c42e80e72
-
SSDEEP
6144:QGMq8GQEojAINykIkXgVuvkOVxq2eH/RDDC:QG/7opNfxQVuvVVXqRDDC
Static task
static1
Behavioral task
behavioral1
Sample
a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85.bin
-
Size
209KB
-
MD5
b37cc999ebecaa5d3b80d0e034cf39cc
-
SHA1
8788f525dc833cf93df087949e47e8ec50957f94
-
SHA256
a48cd8be7ad38f8d8956f843e0bc9e4e3c47447756b80747ecfa1400a7be1b85
-
SHA512
5a01e1035b7dae8f7cf047f1b1318414f3c999a7522959091fff8b2bec1390be01d3f4a98bc55c770c05afef83678534942c938c2a22167dbef2a93c42e80e72
-
SSDEEP
6144:QGMq8GQEojAINykIkXgVuvkOVxq2eH/RDDC:QG/7opNfxQVuvVVXqRDDC
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-