General
-
Target
e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.bin
-
Size
288KB
-
Sample
241112-1y1p9avrel
-
MD5
b00b9b9360331a8066931934cd88fc26
-
SHA1
1adcaf0afa08d5b49ec23382899539c3555270af
-
SHA256
e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550
-
SHA512
989600bd76d896345cfc6b046d3e0e2375412c7debe9e9ad73ec7f983a190204832f38a74d552783930740dcf5ac131ab35b863334dd1f6bcb3c42676a05f46c
-
SSDEEP
6144:AKJ7r1V32l3IeWQUktM7SedNDGFOkmep0DpDWScMZeBBxnf7Ucpzq9R+Bo8/y5Y:rnH3SYeWqtM7VAmLJW1TRc9sC5Y
Static task
static1
Behavioral task
behavioral1
Sample
e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
http://36.231.70.96:28856
Targets
-
-
Target
e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550.bin
-
Size
288KB
-
MD5
b00b9b9360331a8066931934cd88fc26
-
SHA1
1adcaf0afa08d5b49ec23382899539c3555270af
-
SHA256
e716bad4910bf86b8879d9e3b3850cda9c3545a3dc83d096948a47d6a7b5e550
-
SHA512
989600bd76d896345cfc6b046d3e0e2375412c7debe9e9ad73ec7f983a190204832f38a74d552783930740dcf5ac131ab35b863334dd1f6bcb3c42676a05f46c
-
SSDEEP
6144:AKJ7r1V32l3IeWQUktM7SedNDGFOkmep0DpDWScMZeBBxnf7Ucpzq9R+Bo8/y5Y:rnH3SYeWqtM7VAmLJW1TRc9sC5Y
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-