General
-
Target
fc26b5da78908ac3e39766351860c821433cd3bc38ea0176d5b2c8dd6caec237.bin
-
Size
283KB
-
Sample
241203-12khfasmbm
-
MD5
0f2dd5ce672efe9fb5bdcb549c66439f
-
SHA1
b1d6f1dd0fe4058fd2e56f8a53a8cfbe3641005e
-
SHA256
fc26b5da78908ac3e39766351860c821433cd3bc38ea0176d5b2c8dd6caec237
-
SHA512
1113b1569cd116b962a3dcc2be6667e105e2ad357cce92eff131f4bbc1940812cdd8a3ae0fd9e2cfcbe84c5895fe619e8b4d1b0179e60dbb849b88cef24f9c58
-
SSDEEP
6144:jCmLeJkqEVBRl7u/ISQOhRmUoVsU5y5GTcwFLXzl5T:jVeJkq2BReQOhc35MGTcwb5T
Static task
static1
Behavioral task
behavioral1
Sample
fc26b5da78908ac3e39766351860c821433cd3bc38ea0176d5b2c8dd6caec237.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
fc26b5da78908ac3e39766351860c821433cd3bc38ea0176d5b2c8dd6caec237.bin
-
Size
283KB
-
MD5
0f2dd5ce672efe9fb5bdcb549c66439f
-
SHA1
b1d6f1dd0fe4058fd2e56f8a53a8cfbe3641005e
-
SHA256
fc26b5da78908ac3e39766351860c821433cd3bc38ea0176d5b2c8dd6caec237
-
SHA512
1113b1569cd116b962a3dcc2be6667e105e2ad357cce92eff131f4bbc1940812cdd8a3ae0fd9e2cfcbe84c5895fe619e8b4d1b0179e60dbb849b88cef24f9c58
-
SSDEEP
6144:jCmLeJkqEVBRl7u/ISQOhRmUoVsU5y5GTcwFLXzl5T:jVeJkq2BReQOhc35MGTcwb5T
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1