General
-
Target
a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a
-
Size
278KB
-
Sample
231220-mq78gaahgl
-
MD5
3f3f298c4c16663894b2a6b9b496f043
-
SHA1
66c7ba1ad03080b261771d1945b2e66161ca7681
-
SHA256
a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a
-
SHA512
6329d573c10eb969cfdffe7d654e91001d78133dd398f644b96fc42d9dfbaa352b02980ac8fed2eeca7a40e6dfcbb76b7d8cf5d2cd5e00a2215fd06535e79158
-
SSDEEP
6144:krpdy8z+WrqKlRyieeJyUgVqZ83BG5d/baGyJTzvLAoxb:krLy8z+Wrq6yfFUgf4VbaVVXAol
Static task
static1
Behavioral task
behavioral1
Sample
a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a
-
Size
278KB
-
MD5
3f3f298c4c16663894b2a6b9b496f043
-
SHA1
66c7ba1ad03080b261771d1945b2e66161ca7681
-
SHA256
a4f59995e978e4b871481fe13a78cc86133b3a0e72c9493f820572cfc279e69a
-
SHA512
6329d573c10eb969cfdffe7d654e91001d78133dd398f644b96fc42d9dfbaa352b02980ac8fed2eeca7a40e6dfcbb76b7d8cf5d2cd5e00a2215fd06535e79158
-
SSDEEP
6144:krpdy8z+WrqKlRyieeJyUgVqZ83BG5d/baGyJTzvLAoxb:krLy8z+Wrq6yfFUgf4VbaVVXAol
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-