General
-
Target
3c6c974c8e3d600f024048d787c70487a8deb36b2aba81f1559bbed2667dcb15.bin
-
Size
209KB
-
Sample
241109-1wq32atbqq
-
MD5
6d36a7b76907b79174d930e5d44d4384
-
SHA1
e9b3d53658b35ccb0f7ed36138356cc9aa37672c
-
SHA256
3c6c974c8e3d600f024048d787c70487a8deb36b2aba81f1559bbed2667dcb15
-
SHA512
a28c47d3c36e9219f922e4cb0897c43c73b01198e669c7e690604cc17bd7a7fa9b0804c78c9589e2d757f59ecb3a67093daf29926f659d6bfac6609ea67c4f35
-
SSDEEP
6144:9kN/zsbLltB/kHtakQYR9WXuPno/7d2Vt5:iYLZ8XTiXjzd2Vt5
Static task
static1
Behavioral task
behavioral1
Sample
3c6c974c8e3d600f024048d787c70487a8deb36b2aba81f1559bbed2667dcb15.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
3c6c974c8e3d600f024048d787c70487a8deb36b2aba81f1559bbed2667dcb15.bin
-
Size
209KB
-
MD5
6d36a7b76907b79174d930e5d44d4384
-
SHA1
e9b3d53658b35ccb0f7ed36138356cc9aa37672c
-
SHA256
3c6c974c8e3d600f024048d787c70487a8deb36b2aba81f1559bbed2667dcb15
-
SHA512
a28c47d3c36e9219f922e4cb0897c43c73b01198e669c7e690604cc17bd7a7fa9b0804c78c9589e2d757f59ecb3a67093daf29926f659d6bfac6609ea67c4f35
-
SSDEEP
6144:9kN/zsbLltB/kHtakQYR9WXuPno/7d2Vt5:iYLZ8XTiXjzd2Vt5
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-