General
-
Target
94e23e69ee53e7e8317293b6ee87d779d0fa7dc382617a197bb92197acd918c2.bin
-
Size
479KB
-
Sample
241220-1xdjbsvrfr
-
MD5
ddc46d10589d8d5a7dada22455edbda8
-
SHA1
555c2293d5900893250b16685d8b8be983e1d36a
-
SHA256
94e23e69ee53e7e8317293b6ee87d779d0fa7dc382617a197bb92197acd918c2
-
SHA512
f795bcae047710d695c6947e7f06fa373bc4faedee82c4e1faa09c5355a9c84fdaa500d7cf5de397d414026a4b09348bccedee4694ba7b54f89c684f3be0f2d7
-
SSDEEP
6144:wFQjJwWOMhk3li15TUtAEP6Uan+2OejoIsJSTP9u2eACO5DEXwZv3rTYTxHrwvgI:wFQCWOvwlUREboIKkPtCOgrRPuf
Static task
static1
Behavioral task
behavioral1
Sample
94e23e69ee53e7e8317293b6ee87d779d0fa7dc382617a197bb92197acd918c2.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
94e23e69ee53e7e8317293b6ee87d779d0fa7dc382617a197bb92197acd918c2.bin
-
Size
479KB
-
MD5
ddc46d10589d8d5a7dada22455edbda8
-
SHA1
555c2293d5900893250b16685d8b8be983e1d36a
-
SHA256
94e23e69ee53e7e8317293b6ee87d779d0fa7dc382617a197bb92197acd918c2
-
SHA512
f795bcae047710d695c6947e7f06fa373bc4faedee82c4e1faa09c5355a9c84fdaa500d7cf5de397d414026a4b09348bccedee4694ba7b54f89c684f3be0f2d7
-
SSDEEP
6144:wFQjJwWOMhk3li15TUtAEP6Uan+2OejoIsJSTP9u2eACO5DEXwZv3rTYTxHrwvgI:wFQCWOvwlUREboIKkPtCOgrRPuf
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1