General
-
Target
55fbbab9c889cdae4a9b8aa094c1315501f5ac45a8854dfd87c50b5912bac6df.bin
-
Size
260KB
-
Sample
241226-11s37asnat
-
MD5
9ee4affe232798bd56f8af28292ba79c
-
SHA1
ca580f086b35ce4f05850db503046c740df78d75
-
SHA256
55fbbab9c889cdae4a9b8aa094c1315501f5ac45a8854dfd87c50b5912bac6df
-
SHA512
6a70431e167ba510ee6b86943ee0b61eefc12fadc1ca53c5fcff7d82bdd7e53c036038a42ccd9865dc66207e676337601055663d1cd815783a7c33e28f383ef8
-
SSDEEP
6144:ffGR0AEjtRBvTk5RwIXvH96rHbPe5z056MIxMSMsWraFEpdk:GDoXlTkQWvcIZ0pa
Static task
static1
Behavioral task
behavioral1
Sample
55fbbab9c889cdae4a9b8aa094c1315501f5ac45a8854dfd87c50b5912bac6df.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
55fbbab9c889cdae4a9b8aa094c1315501f5ac45a8854dfd87c50b5912bac6df.bin
-
Size
260KB
-
MD5
9ee4affe232798bd56f8af28292ba79c
-
SHA1
ca580f086b35ce4f05850db503046c740df78d75
-
SHA256
55fbbab9c889cdae4a9b8aa094c1315501f5ac45a8854dfd87c50b5912bac6df
-
SHA512
6a70431e167ba510ee6b86943ee0b61eefc12fadc1ca53c5fcff7d82bdd7e53c036038a42ccd9865dc66207e676337601055663d1cd815783a7c33e28f383ef8
-
SSDEEP
6144:ffGR0AEjtRBvTk5RwIXvH96rHbPe5z056MIxMSMsWraFEpdk:GDoXlTkQWvcIZ0pa
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1