General

  • Target

    b9a26d598086bdd293fc94e1926a5e5dc5ff655c23541672a7a5edb2a28510e3.bin

  • Size

    212KB

  • MD5

    ab6b4a18675811af2228dc9462935df9

  • SHA1

    a458c21b0378c4a37f56650ba34c3ca3f876ae63

  • SHA256

    b9a26d598086bdd293fc94e1926a5e5dc5ff655c23541672a7a5edb2a28510e3

  • SHA512

    c690b8b553cbf374fbaacbe09d207aa1483e8f191e3d7716a47f97792fc63a1241f0b034e225ed1cf4e0e6567f8e1acf9d1c5fa2cd543b4302f6216f3df7f126

  • SSDEEP

    6144:acQWYJ8xL2h0iY1FNWuVg5FBrczUJRnxmygX:aXWe86vY1FN/g9cCxG

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • b9a26d598086bdd293fc94e1926a5e5dc5ff655c23541672a7a5edb2a28510e3.bin
    .apk android arch:arm

    lbjhaja.eagcdqgkz.pdllbe.gqalwxow

    vjy7.ydobgso


Android Permissions

b9a26d598086bdd293fc94e1926a5e5dc5ff655c23541672a7a5edb2a28510e3.bin

Permissions

android.pinkskr.pukp.eewjyxod

android.tzhkos.inie.dwirm

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS