General
-
Target
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6
-
Size
390KB
-
Sample
231220-mn6xmaagbj
-
MD5
b88c022119aefff00679f6ee55a51f8e
-
SHA1
51eba7e3d0273a3585b67653ce365a00e7dba325
-
SHA256
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6
-
SHA512
61ee92f81069c0be0144e591008abb5568dfbca66d64fdb52c34e74b3951b01a81bb3ece533364577bd6ec6027f5f868f91e44c8b2d58b89230251b3a9e89623
-
SSDEEP
12288:tjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4SgoO:tjnb8aXzG38wP5x43oO
Static task
static1
Behavioral task
behavioral1
Sample
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6.apk
Behavioral task
behavioral2
Sample
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6
-
Size
390KB
-
MD5
b88c022119aefff00679f6ee55a51f8e
-
SHA1
51eba7e3d0273a3585b67653ce365a00e7dba325
-
SHA256
a49cee047df00fed1b1255da0a5a2d4ac880a0b61bbcd42c74bef656973363f6
-
SHA512
61ee92f81069c0be0144e591008abb5568dfbca66d64fdb52c34e74b3951b01a81bb3ece533364577bd6ec6027f5f868f91e44c8b2d58b89230251b3a9e89623
-
SSDEEP
12288:tjnb8aXpbmW1u3qwRIi49fPwmFA3Jxn4SgoO:tjnb8aXzG38wP5x43oO
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-