General
-
Target
251b9e57976729799b7002f723690423b3f2722653742c6245e5db3aa71649fa.bin
-
Size
212KB
-
Sample
241230-1za6zs1ker
-
MD5
3ed1d9a3e0db9712b0191dbe9562ea25
-
SHA1
6345474f005f75c376fcbe810899d1e35e2709d8
-
SHA256
251b9e57976729799b7002f723690423b3f2722653742c6245e5db3aa71649fa
-
SHA512
1e02e5fb3d5bc32cbf9e8e7c2515ee19d17513328c28ff8e790f87b9a896a0863c905b0effd969fc5ff0a51d38e010c511f6eff6efbc77c35d5c1c313e09e641
-
SSDEEP
3072:ujou0hx1prsAjat8z5aBZTqg1NW33BBFkMIelBNo+TFac9dja4G:uku0XJyUaBZTqgXW3jFkMIePhac9du4G
Static task
static1
Behavioral task
behavioral1
Sample
251b9e57976729799b7002f723690423b3f2722653742c6245e5db3aa71649fa.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
251b9e57976729799b7002f723690423b3f2722653742c6245e5db3aa71649fa.bin
-
Size
212KB
-
MD5
3ed1d9a3e0db9712b0191dbe9562ea25
-
SHA1
6345474f005f75c376fcbe810899d1e35e2709d8
-
SHA256
251b9e57976729799b7002f723690423b3f2722653742c6245e5db3aa71649fa
-
SHA512
1e02e5fb3d5bc32cbf9e8e7c2515ee19d17513328c28ff8e790f87b9a896a0863c905b0effd969fc5ff0a51d38e010c511f6eff6efbc77c35d5c1c313e09e641
-
SSDEEP
3072:ujou0hx1prsAjat8z5aBZTqg1NW33BBFkMIelBNo+TFac9dja4G:uku0XJyUaBZTqgXW3jFkMIePhac9du4G
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1