General
-
Target
307dd09e31d6503e5244418272476ed07258c8579191b7bf9e65cbdb06e5256c.bin
-
Size
212KB
-
Sample
250113-129sbs1nfp
-
MD5
528e67c8da6d4d0c23c3f3bccae953d8
-
SHA1
acdf4a48e9db81820fb3cc485583695a891fb853
-
SHA256
307dd09e31d6503e5244418272476ed07258c8579191b7bf9e65cbdb06e5256c
-
SHA512
40c441e5a988896a2dee5af65309442dd6fbb0773eb87d5edbfbc5e39ae4021f1572e6c94ccb473945489976c596571d46ebd4e5e230b564ae1c3cb5b2e6da84
-
SSDEEP
3072:3Mx7CUyBClrKBmb0/a/ei3iutle3mfq4FG3koARfh3mGD6R2qbD6eff7H+3O:cx+ErFpmRu7fvG0Bh2GD6R2e6e37e3O
Static task
static1
Behavioral task
behavioral1
Sample
307dd09e31d6503e5244418272476ed07258c8579191b7bf9e65cbdb06e5256c.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
307dd09e31d6503e5244418272476ed07258c8579191b7bf9e65cbdb06e5256c.bin
-
Size
212KB
-
MD5
528e67c8da6d4d0c23c3f3bccae953d8
-
SHA1
acdf4a48e9db81820fb3cc485583695a891fb853
-
SHA256
307dd09e31d6503e5244418272476ed07258c8579191b7bf9e65cbdb06e5256c
-
SHA512
40c441e5a988896a2dee5af65309442dd6fbb0773eb87d5edbfbc5e39ae4021f1572e6c94ccb473945489976c596571d46ebd4e5e230b564ae1c3cb5b2e6da84
-
SSDEEP
3072:3Mx7CUyBClrKBmb0/a/ei3iutle3mfq4FG3koARfh3mGD6R2qbD6eff7H+3O:cx+ErFpmRu7fvG0Bh2GD6R2e6e37e3O
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1