General

  • Target

    5d133367f11767a2f598e4464165df484a73f88dd5bd196ce8547c86581db8e8.bin

  • Size

    212KB

  • MD5

    ff5bcb2bd87c8dd7f18b941f64e0b91d

  • SHA1

    b167bde6905915a4051f1df35302ce1c5164d73b

  • SHA256

    5d133367f11767a2f598e4464165df484a73f88dd5bd196ce8547c86581db8e8

  • SHA512

    83300d16baef7a9686fedb1799ca706e25e8bd6211cbc23f250f870e4804bae498abe58d9c724760dfdcc032824c3687cbffa4d7719a533dc135062bf52abca9

  • SSDEEP

    6144:4L/+pjo//Cj0EZh5194Gdd84HraEWHWwo56Rxu:UGpM3i75n4cdP2EW2x

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • 5d133367f11767a2f598e4464165df484a73f88dd5bd196ce8547c86581db8e8.bin
    .apk android arch:arm

    ohvtwhn.fvqpwpkao.xfpqms.zzjtacpa

    rnc7.pqrlqvy


Android Permissions

5d133367f11767a2f598e4464165df484a73f88dd5bd196ce8547c86581db8e8.bin

Permissions

android.sddhg.fiuh.dljtneih

android.vxfmny.kdse.edirs

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS