General
-
Target
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.bin
-
Size
208KB
-
Sample
250121-hmwm2s1pfn
-
MD5
840738950a27bc20212b3c340c57ed3c
-
SHA1
0cc50b40a25caea53bed0768fe8b215cb693e83f
-
SHA256
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4
-
SHA512
fc2373214d4787feeaf035081b4e6644735b9a243756876194d496a7866bd40a8f713fdf6fcbf957d59c7eaaa30feb0d0fd9c63de65c8f5d1c56aa2c530fdb44
-
SSDEEP
3072:M7J7MNYAY/5L3JvcislvA7UuDKdh9SO/pxe8RVlTyKIVxiBxv4r0G77/U5lDh:29AY/xZE5Aw7So/eWkxc40xh
Static task
static1
Behavioral task
behavioral1
Sample
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4.bin
-
Size
208KB
-
MD5
840738950a27bc20212b3c340c57ed3c
-
SHA1
0cc50b40a25caea53bed0768fe8b215cb693e83f
-
SHA256
1e70ee62b6d81016dca716f8e481a8e9c926ad379b858bba2cdf6a24eebd08e4
-
SHA512
fc2373214d4787feeaf035081b4e6644735b9a243756876194d496a7866bd40a8f713fdf6fcbf957d59c7eaaa30feb0d0fd9c63de65c8f5d1c56aa2c530fdb44
-
SSDEEP
3072:M7J7MNYAY/5L3JvcislvA7UuDKdh9SO/pxe8RVlTyKIVxiBxv4r0G77/U5lDh:29AY/xZE5Aw7So/eWkxc40xh
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-