General
-
Target
80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133
-
Size
278KB
-
Sample
231220-d137tsabfp
-
MD5
2c15060d0d2afc6a640a6c2d90861276
-
SHA1
91ac7f43750fddec6e971c28fcff7a749d719702
-
SHA256
80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133
-
SHA512
efacf84dd7b59fa0a48f59108e8142d652ce70363c7629c84bf48ecdb360f6a6a477407c509ac49172d5f28458d90cea7cb7fb6fa79a0d5123999471eb4151f7
-
SSDEEP
6144:K10xTem70N3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaV:Mse201DcbqSCbi4oDGgjuGVCV
Static task
static1
Behavioral task
behavioral1
Sample
80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133
-
Size
278KB
-
MD5
2c15060d0d2afc6a640a6c2d90861276
-
SHA1
91ac7f43750fddec6e971c28fcff7a749d719702
-
SHA256
80f2042473bc9ab53338fab10f302974e50f427a820e741f8b6d64294b170133
-
SHA512
efacf84dd7b59fa0a48f59108e8142d652ce70363c7629c84bf48ecdb360f6a6a477407c509ac49172d5f28458d90cea7cb7fb6fa79a0d5123999471eb4151f7
-
SSDEEP
6144:K10xTem70N3DpCN/zhDQ8qSCIwi441D8ng/6/quXWv98ZWeIaV:Mse201DcbqSCbi4oDGgjuGVCV
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-