General
-
Target
82059815bcfa94586dcc9cc31bdbad2d38985a13531d9a4a9d940edce28dbb3e.bin
-
Size
212KB
-
Sample
250113-12cgtsynhv
-
MD5
666b556abb2628792861985a44be8264
-
SHA1
e1f4dbefe28e968ad1b424a5fa0d7deab749a091
-
SHA256
82059815bcfa94586dcc9cc31bdbad2d38985a13531d9a4a9d940edce28dbb3e
-
SHA512
96d7110d86baed85235dca98fb9fa307810fd8fd17985c2c0d06f74a726846d9e455642417f68f3e36c437a5a203c922390b1e9bb3e57842bf0bba1d2deae9d3
-
SSDEEP
3072:V67fSZibtleFmfq4FO3koADhh3mgD6T2qbt6effup6Pqc9w:0b7NvO0th2gD6T2o6e3u3cO
Static task
static1
Behavioral task
behavioral1
Sample
82059815bcfa94586dcc9cc31bdbad2d38985a13531d9a4a9d940edce28dbb3e.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
82059815bcfa94586dcc9cc31bdbad2d38985a13531d9a4a9d940edce28dbb3e.bin
-
Size
212KB
-
MD5
666b556abb2628792861985a44be8264
-
SHA1
e1f4dbefe28e968ad1b424a5fa0d7deab749a091
-
SHA256
82059815bcfa94586dcc9cc31bdbad2d38985a13531d9a4a9d940edce28dbb3e
-
SHA512
96d7110d86baed85235dca98fb9fa307810fd8fd17985c2c0d06f74a726846d9e455642417f68f3e36c437a5a203c922390b1e9bb3e57842bf0bba1d2deae9d3
-
SSDEEP
3072:V67fSZibtleFmfq4FO3koADhh3mgD6T2qbt6effup6Pqc9w:0b7NvO0th2gD6T2o6e3u3cO
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1