General
-
Target
8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce
-
Size
278KB
-
Sample
231220-has2dsbaf5
-
MD5
30eb88d542c825003e64d369b39289fe
-
SHA1
aaf896efcfdd824a497f322f45f9e4ba311ec8d8
-
SHA256
8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce
-
SHA512
5826f5a8d0ad05827147e4265f5ce91f98b696b7e4259f830fa35ffbe5f8d2a53897951faa3b0313c3433c59ba35d0589ac6073b865cd54194b677d84544fcb6
-
SSDEEP
6144:DysAD8F/GCzUiyiuguhZNt6E0PxYDBxnf7Ucpzq9R+Bo8/y5D:2sA4FrzKhZtEPARc9sC5D
Static task
static1
Behavioral task
behavioral1
Sample
8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce
-
Size
278KB
-
MD5
30eb88d542c825003e64d369b39289fe
-
SHA1
aaf896efcfdd824a497f322f45f9e4ba311ec8d8
-
SHA256
8bf4374a2cd8ccc456710f1f64a78b813084a3d8a854cc9bdd6dc21bfbd1ccce
-
SHA512
5826f5a8d0ad05827147e4265f5ce91f98b696b7e4259f830fa35ffbe5f8d2a53897951faa3b0313c3433c59ba35d0589ac6073b865cd54194b677d84544fcb6
-
SSDEEP
6144:DysAD8F/GCzUiyiuguhZNt6E0PxYDBxnf7Ucpzq9R+Bo8/y5D:2sA4FrzKhZtEPARc9sC5D
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-