General
-
Target
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2.bin
-
Size
277KB
-
Sample
250217-14cwdatpal
-
MD5
c27ee0286fb534866ff4a20f492ba391
-
SHA1
ae67ca299f1d548e54db44c8b96fc63e477c3e8d
-
SHA256
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2
-
SHA512
9ee0c2c55232076fea944984028053bf3c477d06fe890312fdc665050fb8d7275be1c92dfe3eb905986217015ba66d0140986960c336e14158c815ae7d8ff319
-
SSDEEP
6144:4CJ3txkb/n0Kv5aaPDY1TTGZYAE5YO7p5N2zW0VbJkZV/d9:4CJ3Dkrn0W5aa7oT4IlaXJkD/d9
Static task
static1
Behavioral task
behavioral1
Sample
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
xloader_apk
https://docs.google.com/document/d/1s0n64k12_r9MglT5m9lr63M5F3e-xRyaMeYP7rdOTrA/mobilebasic
-
user_agent
Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Mobile Safari/537.36
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.121 Safari/537.36
Targets
-
-
Target
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2.bin
-
Size
277KB
-
MD5
c27ee0286fb534866ff4a20f492ba391
-
SHA1
ae67ca299f1d548e54db44c8b96fc63e477c3e8d
-
SHA256
90d516f09e10dad928b492669c6d437656e8779acad0fcc2e25d0e4c15f15ce2
-
SHA512
9ee0c2c55232076fea944984028053bf3c477d06fe890312fdc665050fb8d7275be1c92dfe3eb905986217015ba66d0140986960c336e14158c815ae7d8ff319
-
SSDEEP
6144:4CJ3txkb/n0Kv5aaPDY1TTGZYAE5YO7p5N2zW0VbJkZV/d9:4CJ3Dkrn0W5aa7oT4IlaXJkD/d9
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests changing the default SMS application.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1