General
-
Target
3cde1f0596cbd9647812ac1fd07cf06f05e0671e2da4f4b2599eccf362e39fa7.bin
-
Size
283KB
-
Sample
241122-1z6b5azqgt
-
MD5
f302f6e7c72cfe373148e4378027ec80
-
SHA1
945a5b91c13ea8237841c97f29b00cf0336bb3a3
-
SHA256
3cde1f0596cbd9647812ac1fd07cf06f05e0671e2da4f4b2599eccf362e39fa7
-
SHA512
db6aee433914d410cba4936d7e9d1bbd1bff8bfc0bc9b88cbbe45158329b00fab397bdfd0fb3d62338f39d7cbe78160889a77789a2d1d18a499640c2c03f80b3
-
SSDEEP
6144:IRCmLeJkzwa/Eh1kUny8nYTW6A/KP5z+HaEZZDim:SVeJk0a/kkUfYTWKhz8
Static task
static1
Behavioral task
behavioral1
Sample
3cde1f0596cbd9647812ac1fd07cf06f05e0671e2da4f4b2599eccf362e39fa7.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
3cde1f0596cbd9647812ac1fd07cf06f05e0671e2da4f4b2599eccf362e39fa7.bin
-
Size
283KB
-
MD5
f302f6e7c72cfe373148e4378027ec80
-
SHA1
945a5b91c13ea8237841c97f29b00cf0336bb3a3
-
SHA256
3cde1f0596cbd9647812ac1fd07cf06f05e0671e2da4f4b2599eccf362e39fa7
-
SHA512
db6aee433914d410cba4936d7e9d1bbd1bff8bfc0bc9b88cbbe45158329b00fab397bdfd0fb3d62338f39d7cbe78160889a77789a2d1d18a499640c2c03f80b3
-
SSDEEP
6144:IRCmLeJkzwa/Eh1kUny8nYTW6A/KP5z+HaEZZDim:SVeJk0a/kkUfYTWKhz8
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-