General
-
Target
aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0
-
Size
278KB
-
Sample
231220-ngvfpaged4
-
MD5
3a06aae100ab577d6fcdd66875ed7ef8
-
SHA1
1af4e4becf498622c3b28acbdb913a64cb494b65
-
SHA256
aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0
-
SHA512
e3ac1f870e033a6e77a09932099e7d723341ebede75670d844511085b7773ca7781f1a95a5fbc5d96d3c0127e366f04e149bea280fef8e5f81263fa5aaa28ed1
-
SSDEEP
6144:deQGVSk+cpzqjR+Bo8/y5+JMzInDJ845pNpaBq98iEeCfGTWr4ADDco:oQkSkyjsC5+J/i45jAqenFfGScQDco
Static task
static1
Behavioral task
behavioral1
Sample
aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0.apk
Resource
android-33-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0
-
Size
278KB
-
MD5
3a06aae100ab577d6fcdd66875ed7ef8
-
SHA1
1af4e4becf498622c3b28acbdb913a64cb494b65
-
SHA256
aa31759d866bb4d01bea7f860ae63b4d8d12f9771393b081c4fc1effb17671a0
-
SHA512
e3ac1f870e033a6e77a09932099e7d723341ebede75670d844511085b7773ca7781f1a95a5fbc5d96d3c0127e366f04e149bea280fef8e5f81263fa5aaa28ed1
-
SSDEEP
6144:deQGVSk+cpzqjR+Bo8/y5+JMzInDJ845pNpaBq98iEeCfGTWr4ADDco:oQkSkyjsC5+J/i45jAqenFfGScQDco
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-