General
-
Target
43cfd99c3be5ae2b4ca1148564da562d0dbe98748ba09e465de2d2ec0d775b1a.bin
-
Size
260KB
-
Sample
241122-12qdpazrcw
-
MD5
84e0de91d83746dc611ef6853652d76a
-
SHA1
3a2741d9756f4c7a79487ecbacd9d2712f4526f3
-
SHA256
43cfd99c3be5ae2b4ca1148564da562d0dbe98748ba09e465de2d2ec0d775b1a
-
SHA512
fb155a932bcf41465522f00ecf5dc9163e36ab665aeb41b4bc998bf77ea93500b16009b8a3409fe31c0bc5da0e402416a3d7bce000dd423954287d5b94c9bd1b
-
SSDEEP
6144:RBeUwUngxlfbwxh67rcbSRUKLuiWTPm4S4mEGAeCYggn:+n9rcbO3qTO44BN
Static task
static1
Behavioral task
behavioral1
Sample
43cfd99c3be5ae2b4ca1148564da562d0dbe98748ba09e465de2d2ec0d775b1a.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
xloader_apk
http://91.204.226.54:28899
Targets
-
-
Target
43cfd99c3be5ae2b4ca1148564da562d0dbe98748ba09e465de2d2ec0d775b1a.bin
-
Size
260KB
-
MD5
84e0de91d83746dc611ef6853652d76a
-
SHA1
3a2741d9756f4c7a79487ecbacd9d2712f4526f3
-
SHA256
43cfd99c3be5ae2b4ca1148564da562d0dbe98748ba09e465de2d2ec0d775b1a
-
SHA512
fb155a932bcf41465522f00ecf5dc9163e36ab665aeb41b4bc998bf77ea93500b16009b8a3409fe31c0bc5da0e402416a3d7bce000dd423954287d5b94c9bd1b
-
SSDEEP
6144:RBeUwUngxlfbwxh67rcbSRUKLuiWTPm4S4mEGAeCYggn:+n9rcbO3qTO44BN
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1