General
-
Target
37cd5534c1fe58cb3f88f7e2f74b47c6cbcc64351fa5d19118fbacef7e247414.bin
-
Size
212KB
-
Sample
250415-13blxsxvct
-
MD5
3fc0ec5de459873923bfeaa9bad9bbfb
-
SHA1
742a43508563c478c0f1ffb09bb983e559d082a8
-
SHA256
37cd5534c1fe58cb3f88f7e2f74b47c6cbcc64351fa5d19118fbacef7e247414
-
SHA512
414f5250a6fe4daaa3a10846cc5149c89f79fde9ee4a95fed46881d9f80c7e861f4f71b2b1874fafce7361fdd3857bcc02543e00e658a70600535d4181380f78
-
SSDEEP
3072:LokwE0VP5dYMY9ZCilohUUfHYwyKJKH6BcbYV+OzksKbQwSKFRoxCdioXx3A4f+H:LoP5bY/hiU8BoWksKkL/sdioXDf+faar
Static task
static1
Behavioral task
behavioral1
Sample
37cd5534c1fe58cb3f88f7e2f74b47c6cbcc64351fa5d19118fbacef7e247414.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
xloader_apk
https://m.vk.com/id730148259?act=info
https://m.vk.com/id730149630?act=info
-
user_agent
Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.141 Mobile Safari/537.36 Edg/112.0.0.0
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36
Targets
-
-
Target
37cd5534c1fe58cb3f88f7e2f74b47c6cbcc64351fa5d19118fbacef7e247414.bin
-
Size
212KB
-
MD5
3fc0ec5de459873923bfeaa9bad9bbfb
-
SHA1
742a43508563c478c0f1ffb09bb983e559d082a8
-
SHA256
37cd5534c1fe58cb3f88f7e2f74b47c6cbcc64351fa5d19118fbacef7e247414
-
SHA512
414f5250a6fe4daaa3a10846cc5149c89f79fde9ee4a95fed46881d9f80c7e861f4f71b2b1874fafce7361fdd3857bcc02543e00e658a70600535d4181380f78
-
SSDEEP
3072:LokwE0VP5dYMY9ZCilohUUfHYwyKJKH6BcbYV+OzksKbQwSKFRoxCdioXx3A4f+H:LoP5bY/hiU8BoWksKkL/sdioXDf+faar
-
XLoader payload
-
Xloader_apk family
-
Checks if the Android device is rooted.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v16
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1