General
-
Target
8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169
-
Size
278KB
-
Sample
231220-hbmwrsfhaj
-
MD5
ad8f13c15bf702a1f22f00bd19a8a9b7
-
SHA1
c42436fc74ec5cf9749aef23c741e87077cc84fa
-
SHA256
8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169
-
SHA512
8d37996c87e3f9a0cc12822b4878f439dfcd3c65114c99ef85442ddb45b3a368e35fbf1218a490356421adba03cd76d848a90832e002e30d5e8adf1f9c889022
-
SSDEEP
6144:lKe/GCzUiyiuguhZNt6E0PxYTvBxnf7Ucpzq9R+Bo8/y5c:3rzKhZtEPS5Rc9sC5c
Static task
static1
Behavioral task
behavioral1
Sample
8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169
-
Size
278KB
-
MD5
ad8f13c15bf702a1f22f00bd19a8a9b7
-
SHA1
c42436fc74ec5cf9749aef23c741e87077cc84fa
-
SHA256
8c0d4a1d401943bf1f39b17d9c01e89d48ca192041a4fe59e3fdfcbbfd6ff169
-
SHA512
8d37996c87e3f9a0cc12822b4878f439dfcd3c65114c99ef85442ddb45b3a368e35fbf1218a490356421adba03cd76d848a90832e002e30d5e8adf1f9c889022
-
SSDEEP
6144:lKe/GCzUiyiuguhZNt6E0PxYTvBxnf7Ucpzq9R+Bo8/y5c:3rzKhZtEPS5Rc9sC5c
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-