General
-
Target
4421a9122899400470925d5d950a102a0fc47a279051217e18456be09c61ca49.bin
-
Size
260KB
-
Sample
241230-1zbshstmf1
-
MD5
bdb40209c8128cc0f1763d6ec94a3565
-
SHA1
4303228bc813e46e1df2619fa6a514141c291855
-
SHA256
4421a9122899400470925d5d950a102a0fc47a279051217e18456be09c61ca49
-
SHA512
278a358acd44856a3c5b8a94586b626b888e683d5899e73ea511c6ef977999029349579f0e65300510ceff1680599f0b8f514f89af7e589e6975aba5c7191b61
-
SSDEEP
6144:L6asRfXHMwvgNBAoHu8HGLoAFjjeepAb5nwg6C4NO1:tcf3MM0A8mFfemY5wg6C4NO1
Static task
static1
Behavioral task
behavioral1
Sample
4421a9122899400470925d5d950a102a0fc47a279051217e18456be09c61ca49.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
4421a9122899400470925d5d950a102a0fc47a279051217e18456be09c61ca49.bin
-
Size
260KB
-
MD5
bdb40209c8128cc0f1763d6ec94a3565
-
SHA1
4303228bc813e46e1df2619fa6a514141c291855
-
SHA256
4421a9122899400470925d5d950a102a0fc47a279051217e18456be09c61ca49
-
SHA512
278a358acd44856a3c5b8a94586b626b888e683d5899e73ea511c6ef977999029349579f0e65300510ceff1680599f0b8f514f89af7e589e6975aba5c7191b61
-
SSDEEP
6144:L6asRfXHMwvgNBAoHu8HGLoAFjjeepAb5nwg6C4NO1:tcf3MM0A8mFfemY5wg6C4NO1
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1