General
-
Target
9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5
-
Size
278KB
-
Sample
231220-l49ssaghgk
-
MD5
b0596c7bdf10eeccdfbdee5b30d4a0d6
-
SHA1
95c6bf0c90bac6c3de30bc63c15146181ffdf1a4
-
SHA256
9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5
-
SHA512
ccb8c18f39e2a513a2790f1f26dcb3da4f6a51704405940aac4af2a53ee1281e710cbdbe0a2f985f917a4d652f64b17a1491d2108015016f3c05d9d7d5fd19ed
-
SSDEEP
6144:f86ZexSNP+WrqKlRyieeJyUgVqZ83BG5TSbaGyJTzvLAoxM:U6ZfNP+Wrq6yfFUgf42baVVXAom
Static task
static1
Behavioral task
behavioral1
Sample
9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5
-
Size
278KB
-
MD5
b0596c7bdf10eeccdfbdee5b30d4a0d6
-
SHA1
95c6bf0c90bac6c3de30bc63c15146181ffdf1a4
-
SHA256
9fe5942d4ef29c27dcc592aed6fa4051a4d344517c129e323c5399d80a7086b5
-
SHA512
ccb8c18f39e2a513a2790f1f26dcb3da4f6a51704405940aac4af2a53ee1281e710cbdbe0a2f985f917a4d652f64b17a1491d2108015016f3c05d9d7d5fd19ed
-
SSDEEP
6144:f86ZexSNP+WrqKlRyieeJyUgVqZ83BG5TSbaGyJTzvLAoxM:U6ZfNP+Wrq6yfFUgf42baVVXAom
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-