General
-
Target
a4d9529071ea13a08348aa501ef3adc03897e563dd14871f21ce1faf8d5d5da8.bin
-
Size
440KB
-
Sample
241114-1247vatgmf
-
MD5
9ed55284e563caa7f5ea94054ab7a97e
-
SHA1
b6389c2d39361376bc64c9954ebde77cfcadedd4
-
SHA256
a4d9529071ea13a08348aa501ef3adc03897e563dd14871f21ce1faf8d5d5da8
-
SHA512
8fbe5ca4689b45e644aafd49b06077206d08d2c135aaba5181ad5646cea538bbe2ffad9aab7b6abddbfba8bf2ad125a328408ee7e9462a4abac586caf59f483e
-
SSDEEP
6144:7f5KLbp6uO0BcPbadoeVU2fdIOZIfMA4fwpOwgSngxoQcg+O4q+eK10jObceW:7BKxcaie1FFG54VVSgxt7e0jcW
Static task
static1
Behavioral task
behavioral1
Sample
a4d9529071ea13a08348aa501ef3adc03897e563dd14871f21ce1faf8d5d5da8.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
a4d9529071ea13a08348aa501ef3adc03897e563dd14871f21ce1faf8d5d5da8.bin
-
Size
440KB
-
MD5
9ed55284e563caa7f5ea94054ab7a97e
-
SHA1
b6389c2d39361376bc64c9954ebde77cfcadedd4
-
SHA256
a4d9529071ea13a08348aa501ef3adc03897e563dd14871f21ce1faf8d5d5da8
-
SHA512
8fbe5ca4689b45e644aafd49b06077206d08d2c135aaba5181ad5646cea538bbe2ffad9aab7b6abddbfba8bf2ad125a328408ee7e9462a4abac586caf59f483e
-
SSDEEP
6144:7f5KLbp6uO0BcPbadoeVU2fdIOZIfMA4fwpOwgSngxoQcg+O4q+eK10jObceW:7BKxcaie1FFG54VVSgxt7e0jcW
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1