General

  • Target

    4d83c9549a4426c599dd3dfe2a8655d9cce1c98efeaaa7ac386b6efe6b48cc99.bin

  • Size

    212KB

  • MD5

    bf6b0442c62ce927c2c5df29c9f7dbbd

  • SHA1

    4fbe6b5ea9f82b41ca9f91a2ae23ff7e9cc2dd2b

  • SHA256

    4d83c9549a4426c599dd3dfe2a8655d9cce1c98efeaaa7ac386b6efe6b48cc99

  • SHA512

    56f059f028d82cd5bcfcdd51b94e99d711afa29f997643ac63180bfb83f9717aab9025caf666f4daff633b6bd245b6a96669607ebfe9fdb8b8eca45233cac8ae

  • SSDEEP

    6144:BkHgndSIvWnCuFXOSoqoMUZX8bdxGPIFCGRCZQDK:tW9FXOSovM15IP6COs

Score
10/10

Malware Config

Signatures

  • XLoader payload 1 IoCs
  • Xloader_apk family
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 10 IoCs

Files

  • 4d83c9549a4426c599dd3dfe2a8655d9cce1c98efeaaa7ac386b6efe6b48cc99.bin
    .apk android arch:arm64

    ebtmccp.evueabzhn.pszysh.lpqapifz

    aqh7.kytahpq


Android Permissions

4d83c9549a4426c599dd3dfe2a8655d9cce1c98efeaaa7ac386b6efe6b48cc99.bin

Permissions

android.rxblq.nbxj.yojtaywo

android.wkhbaoax.vrlg.tuqgw

android.permission.ACCESS_WIFI_STATE

android.permission.CHANGE_NETWORK_STATE

android.permission.VIBRATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.READ_EXTERNAL_STORAGE

android.permission.ACCESS_NETWORK_STATE

android.permission.MODIFY_AUDIO_SETTINGS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.INTERNET

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.READ_CONTACTS

android.permission.READ_PHONE_STATE

android.permission.GET_ACCOUNTS

android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS

android.permission.FOREGROUND_SERVICE

android.permission.POST_NOTIFICATIONS

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.READ_PHONE_NUMBERS