General
-
Target
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199
-
Size
278KB
-
Sample
231220-glgxtshha5
-
MD5
1d21fa0ced2a9036abd1aba44a812c89
-
SHA1
312c7ae429d0ae92d97fd5fec39db11414b56a09
-
SHA256
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199
-
SHA512
e5aa6e738f10ba5b67ee4b7c29d8ee81db1446e25b3e5370eb395b9f37b60ce1be478ee8f205577363deed68484d9148f57f0efa883331ffbf8257940ae7f97f
-
SSDEEP
6144:9e/GCzUiyiuguhZNt6E0PxYaBxnf7Ucpzq9R+Bo8/y5N:krzKhZtEPJRc9sC5N
Static task
static1
Behavioral task
behavioral1
Sample
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199
-
Size
278KB
-
MD5
1d21fa0ced2a9036abd1aba44a812c89
-
SHA1
312c7ae429d0ae92d97fd5fec39db11414b56a09
-
SHA256
896cb9ede7cc28fa55370654bd54f5e22711ddacace4d994755574e23df99199
-
SHA512
e5aa6e738f10ba5b67ee4b7c29d8ee81db1446e25b3e5370eb395b9f37b60ce1be478ee8f205577363deed68484d9148f57f0efa883331ffbf8257940ae7f97f
-
SSDEEP
6144:9e/GCzUiyiuguhZNt6E0PxYaBxnf7Ucpzq9R+Bo8/y5N:krzKhZtEPJRc9sC5N
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-