General

  • Target

    d7b880fc340d0b6374d583ba292514db287c6630bce571746dd8d16e3c23e60f.bin

  • Size

    212KB

  • MD5

    e78c9e9f00c1b1d8eabe314057211615

  • SHA1

    f90facc0fc7d42585276c07cc95049e28de32115

  • SHA256

    d7b880fc340d0b6374d583ba292514db287c6630bce571746dd8d16e3c23e60f

  • SHA512

    4624827d487492ddcaa45f40574762c9f4c02792460a10e2118959050844cab438e5955aa9b858565858213d476264ccaf6ba6e1c848e1b5154fab9f6fe6d389

  • SSDEEP

    6144:g7g0aqCe2UElqBsgoQmLxy1bkR1aTiWyIZ:+gTqCEE2BoQwxy1Ii

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • d7b880fc340d0b6374d583ba292514db287c6630bce571746dd8d16e3c23e60f.bin
    .apk android arch:arm

    cxbwcqo.jejjzqxov.hbjbnd.ubweuxea

    stj7.dfbwyxs


Android Permissions

d7b880fc340d0b6374d583ba292514db287c6630bce571746dd8d16e3c23e60f.bin

Permissions

android.arred.lndx.fijojuzy

android.babskfo.ujty.neoqt

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS