General

  • Target

    451ae11f4e9b1dcf01f7c5fa1f7cc8e91b94788663015bad39ea78b4a01a8bed.bin

  • Size

    212KB

  • MD5

    99379f581ba3eeada9946b9340955aed

  • SHA1

    ffe6b4fef566266ea653fef008d091f4519d0476

  • SHA256

    451ae11f4e9b1dcf01f7c5fa1f7cc8e91b94788663015bad39ea78b4a01a8bed

  • SHA512

    506a76855a751032f1c7d01aa487683f4b755e14235d820060c045ce9ffa83d28e1ba6250b28609b60dd89597a7110a28f20bcbfe13b668461a150c830b88f5a

  • SSDEEP

    6144:+Co0fkhZ8nL2h0mY1FjWcVg5FBncz+J/nxPzfD+:+Cor8gnY1Fj9g9ImxbL+

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • 451ae11f4e9b1dcf01f7c5fa1f7cc8e91b94788663015bad39ea78b4a01a8bed.bin
    .apk android arch:arm

    cljmqnc.hntzdxpqi.rpxkam.vnxzmlez

    ghm7.ontlxjs


Android Permissions

451ae11f4e9b1dcf01f7c5fa1f7cc8e91b94788663015bad39ea78b4a01a8bed.bin

Permissions

android.jwvd.tlwe.skyanjwp

android.wqbrwqc.gagi.yfzri

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS