General

  • Target

    bdbd76405add7b0f7b699e00e6ce8d1d485d24de4760fb93e532274ce9d9cc24.bin

  • Size

    212KB

  • MD5

    e9701a05f0a229b352186130ee4ff810

  • SHA1

    73bd1c038a8afb554f33d69651b808189cc5aafe

  • SHA256

    bdbd76405add7b0f7b699e00e6ce8d1d485d24de4760fb93e532274ce9d9cc24

  • SHA512

    6c1bb5b3ebf084bca702539fa03aaa18d31e57a10fe8750050ee5215ef03190847b34f29d57044e47506585326fcf83dae58f365b6a95811acf7cf5ae8efac4e

  • SSDEEP

    6144:lUmsBJdb8VL2h0OY1FJWoVg5FBnczQJrnxtVLv:BIdb8+jY1FJ1g9Ioxv

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 11 IoCs

Files

  • bdbd76405add7b0f7b699e00e6ce8d1d485d24de4760fb93e532274ce9d9cc24.bin
    .apk android arch:arm

    zqpvbpv.rdxxgsqvd.ylobfm.wikgwdgo

    nbg7.okalhwj


Android Permissions

bdbd76405add7b0f7b699e00e6ce8d1d485d24de4760fb93e532274ce9d9cc24.bin

Permissions

android.cmhpqmy.qppp.zkcrisfj

android.drcry.bmdv.zyqsh

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.MANAGE_EXTERNAL_STORAGE

android.permission.READ_PHONE_NUMBERS