General
-
Target
54614ad0d7aa06fe23f68ad1036d20c3e9c1b3f2587d273a204e9bd366c723f0.bin
-
Size
212KB
-
Sample
250106-11vxsazmes
-
MD5
e8b95fefd64db93107ef411f12249cde
-
SHA1
28b93e2823f15d24249f7a57ffa16b9a6132bc6b
-
SHA256
54614ad0d7aa06fe23f68ad1036d20c3e9c1b3f2587d273a204e9bd366c723f0
-
SHA512
c96bb53d76627e751f2f31de8014169ba36376d7aacbb1799c37d3ff2f4913cfa333202195843b43fb7ddc06a46c835189131a60224fdc180c10389c98d7b5fb
-
SSDEEP
6144:ZczkBn/Am0sh0EVh5194idD84HrAwW1Owos9R:azKrv5n4YDPMwWc83
Static task
static1
Behavioral task
behavioral1
Sample
54614ad0d7aa06fe23f68ad1036d20c3e9c1b3f2587d273a204e9bd366c723f0.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
54614ad0d7aa06fe23f68ad1036d20c3e9c1b3f2587d273a204e9bd366c723f0.bin
-
Size
212KB
-
MD5
e8b95fefd64db93107ef411f12249cde
-
SHA1
28b93e2823f15d24249f7a57ffa16b9a6132bc6b
-
SHA256
54614ad0d7aa06fe23f68ad1036d20c3e9c1b3f2587d273a204e9bd366c723f0
-
SHA512
c96bb53d76627e751f2f31de8014169ba36376d7aacbb1799c37d3ff2f4913cfa333202195843b43fb7ddc06a46c835189131a60224fdc180c10389c98d7b5fb
-
SSDEEP
6144:ZczkBn/Am0sh0EVh5194idD84HrAwW1Owos9R:azKrv5n4YDPMwWc83
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1