General
-
Target
5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd.bin
-
Size
283KB
-
Sample
230825-1y7tkagf9w
-
MD5
332c27bf469aecb5ccec15d019c23a80
-
SHA1
e2bc3031376c5f5a4336b5cf177f0116fce847b4
-
SHA256
5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd
-
SHA512
4b32724efd0532a4b9e00149a24cba67518c7b3aa96666b9a3e11bf1c506844ac89770d2d18a260fb20282aa965c9c55869cd79734583ab644ddc59be5cfeb23
-
SSDEEP
6144:vPZaBXwy+eQ1lSsfTx3sB09ptgPU/vvrFUt+d68P65sv/DLE7yVLQ6Y:nZuXwyN4Bd8B0PtgSvRrHP102VU
Static task
static1
Behavioral task
behavioral1
Sample
5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd.apk
Resource
android-x64-arm64-20230824-en
Malware Config
Extracted
xloader_apk
http://91.204.227.33:28899
Targets
-
-
Target
5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd.bin
-
Size
283KB
-
MD5
332c27bf469aecb5ccec15d019c23a80
-
SHA1
e2bc3031376c5f5a4336b5cf177f0116fce847b4
-
SHA256
5d3f8e7e845db3f3cd0dff7e0b7125979d9b087edfc6d8a4bfb9879602c5cbdd
-
SHA512
4b32724efd0532a4b9e00149a24cba67518c7b3aa96666b9a3e11bf1c506844ac89770d2d18a260fb20282aa965c9c55869cd79734583ab644ddc59be5cfeb23
-
SSDEEP
6144:vPZaBXwy+eQ1lSsfTx3sB09ptgPU/vvrFUt+d68P65sv/DLE7yVLQ6Y:nZuXwyN4Bd8B0PtgSvRrHP102VU
-
XLoader payload
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Uses Crypto APIs (Might try to encrypt user data).
-