General
-
Target
a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8
-
Size
278KB
-
Sample
231220-mra95aecb5
-
MD5
76b4490b1ea89fb776f075d96369d70b
-
SHA1
d7a82954b1501dfbf0120eb5a60e61ead3096ab1
-
SHA256
a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8
-
SHA512
bb4a630ffdc2f52a7cd8dbbe634bbd3d4d372378dcd3ebfd1302967ebe3452ec7450c6b4fbecca90b19d7b6960727cc8a812d85fe9affd72d498b75020ded354
-
SSDEEP
6144:4bBxnf7Ucpzq9R+Bo8/y54e/GCzUiyiuguhZNt6E0PxYk:uRc9sC5vrzKhZtEPp
Static task
static1
Behavioral task
behavioral1
Sample
a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8
-
Size
278KB
-
MD5
76b4490b1ea89fb776f075d96369d70b
-
SHA1
d7a82954b1501dfbf0120eb5a60e61ead3096ab1
-
SHA256
a51aa4d28301feddc3fa634d3e9cf14bd1d6274f345a2d2899e1dbc4878a63b8
-
SHA512
bb4a630ffdc2f52a7cd8dbbe634bbd3d4d372378dcd3ebfd1302967ebe3452ec7450c6b4fbecca90b19d7b6960727cc8a812d85fe9affd72d498b75020ded354
-
SSDEEP
6144:4bBxnf7Ucpzq9R+Bo8/y54e/GCzUiyiuguhZNt6E0PxYk:uRc9sC5vrzKhZtEPp
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-