General
-
Target
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214
-
Size
278KB
-
Sample
231220-hwcljaggfn
-
MD5
551e5fa9b14d37b224a7784cbcfa3c0b
-
SHA1
b8fc6fc2cd097536d66f0167b09e8a7247ffbfcb
-
SHA256
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214
-
SHA512
f185ab1eece74cb7adc64c370d594cf0d742a569e5578d6c04a94c18a622b0fbc3bde259fb864a14a20e90e3773efb8df6890062bee1cd636861cbcbe5f23063
-
SSDEEP
6144:3NPeAmgQKM0hFZzkkjTxdA3gky3RpSfOWtzIea0:pePgQsPPdA3gky32fHtzIel
Static task
static1
Behavioral task
behavioral1
Sample
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214
-
Size
278KB
-
MD5
551e5fa9b14d37b224a7784cbcfa3c0b
-
SHA1
b8fc6fc2cd097536d66f0167b09e8a7247ffbfcb
-
SHA256
8dfd990dae5cec2b0e24afd04862eb9051e18a4953ea15cc1febe97f84c53214
-
SHA512
f185ab1eece74cb7adc64c370d594cf0d742a569e5578d6c04a94c18a622b0fbc3bde259fb864a14a20e90e3773efb8df6890062bee1cd636861cbcbe5f23063
-
SSDEEP
6144:3NPeAmgQKM0hFZzkkjTxdA3gky3RpSfOWtzIea0:pePgQsPPdA3gky32fHtzIel
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-