General
-
Target
24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc.bin
-
Size
212KB
-
Sample
250103-1z3k8sylfj
-
MD5
d7ea904b8cd38383e1839e264db3e4fb
-
SHA1
d3d9d27381334347e7cb27c272f45af2237f3c75
-
SHA256
24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc
-
SHA512
c466a925e8341a424a885a08ca59868b2cfc7d502fa7b499c677bce793520fd356c02a53dee8a0943588e9342e11f5a29af38be0a2276dd71932c5d84ea5059a
-
SSDEEP
6144:WgMjFj00EHh5194CdV84Hro0WLmwo0pcxcP:W7sB5n44VP00WCEV
Static task
static1
Behavioral task
behavioral1
Sample
24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc.bin
-
Size
212KB
-
MD5
d7ea904b8cd38383e1839e264db3e4fb
-
SHA1
d3d9d27381334347e7cb27c272f45af2237f3c75
-
SHA256
24885da3aac4df3d8e087d27f254cc53abe5750a931804406343516505e90adc
-
SHA512
c466a925e8341a424a885a08ca59868b2cfc7d502fa7b499c677bce793520fd356c02a53dee8a0943588e9342e11f5a29af38be0a2276dd71932c5d84ea5059a
-
SSDEEP
6144:WgMjFj00EHh5194CdV84Hro0WLmwo0pcxcP:W7sB5n44VP00WCEV
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1