General

  • Target

    c48e35c597f6feba7b83dfce5ce8212c381f1e068d9231dc015c5e8e41dc8107.bin

  • Size

    212KB

  • MD5

    e765ac7246bc913f1893c568759de425

  • SHA1

    fe9c80d18154b37536462a8ddf83b6128cad78a9

  • SHA256

    c48e35c597f6feba7b83dfce5ce8212c381f1e068d9231dc015c5e8e41dc8107

  • SHA512

    330059d5756cd370bbdde927fe37f5d1d27d6a2ab1827536f5850b387d028f240c651190f5cc2ae649abd1020ecb4ec9d7ebe8630837309543f38c3723cb019c

  • SSDEEP

    6144:sBG0gFLQfYX8nL2h0mY1FjWcVg5FBncz+J/nxgoVY:sMtOf08gnY1Fj9g9ImxgoC

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • c48e35c597f6feba7b83dfce5ce8212c381f1e068d9231dc015c5e8e41dc8107.bin
    .apk android arch:arm

    grktxhk.zzethuucy.bqxotq.yzjcaxoa

    oft7.lyphiir


Android Permissions

c48e35c597f6feba7b83dfce5ce8212c381f1e068d9231dc015c5e8e41dc8107.bin

Permissions

android.cmvqov.hybe.okrkisxf

android.tfnstx.hzop.jhzzj

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS