General
-
Target
d17d27c74d7dff63f3665b0a9f55984995db92274aae83eeb5413a9aeb2119e5.bin
-
Size
212KB
-
Sample
250114-13gsya1pbz
-
MD5
9f939b7c4bc80fe4df7543f34758381c
-
SHA1
83415eb90364e3dcf7859f4d173e0c4d3bb83f90
-
SHA256
d17d27c74d7dff63f3665b0a9f55984995db92274aae83eeb5413a9aeb2119e5
-
SHA512
305af59c7ecda0caa1f2823e50446cb4b23797bfb98be4a4b894c1a50116d1c0df5a3130ff66e5ab18de55fd809ad419096228ac19dbe62e3eb72e77b0565e30
-
SSDEEP
6144:UnPOwSFgCTINw0a7dva0Rh2cD6L2a6e34kXtaP:8IvINw0eRyR6e3lXIP
Static task
static1
Behavioral task
behavioral1
Sample
d17d27c74d7dff63f3665b0a9f55984995db92274aae83eeb5413a9aeb2119e5.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
d17d27c74d7dff63f3665b0a9f55984995db92274aae83eeb5413a9aeb2119e5.bin
-
Size
212KB
-
MD5
9f939b7c4bc80fe4df7543f34758381c
-
SHA1
83415eb90364e3dcf7859f4d173e0c4d3bb83f90
-
SHA256
d17d27c74d7dff63f3665b0a9f55984995db92274aae83eeb5413a9aeb2119e5
-
SHA512
305af59c7ecda0caa1f2823e50446cb4b23797bfb98be4a4b894c1a50116d1c0df5a3130ff66e5ab18de55fd809ad419096228ac19dbe62e3eb72e77b0565e30
-
SSDEEP
6144:UnPOwSFgCTINw0a7dva0Rh2cD6L2a6e34kXtaP:8IvINw0eRyR6e3lXIP
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1