General
-
Target
79258769974d7bcdd9b7dc2ca290dfca
-
Size
445KB
-
Sample
231226-sytypsefb7
-
MD5
79258769974d7bcdd9b7dc2ca290dfca
-
SHA1
5ede2182067fd66ba831e7ebbd72da77a7c7335c
-
SHA256
790b52994076987f5a949b08a2bad4c7817c1239d57737d4312ac29eddd40121
-
SHA512
b2610aa06445f0cf98f01ce38eb367822dfc8959cc639c507bab05e6d7c8c83fc78c886df80e0b57359079b8be3487177621cea0609417385139376480051ed5
-
SSDEEP
12288:ixDA0l+E8JWyaBte+M1SyD7DAEXqyqQnSMey7SQZy8:iAiBrM1SyD7Duy5g8k8
Static task
static1
Behavioral task
behavioral1
Sample
79258769974d7bcdd9b7dc2ca290dfca.apk
Resource
android-x86-arm-20231215-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
79258769974d7bcdd9b7dc2ca290dfca
-
Size
445KB
-
MD5
79258769974d7bcdd9b7dc2ca290dfca
-
SHA1
5ede2182067fd66ba831e7ebbd72da77a7c7335c
-
SHA256
790b52994076987f5a949b08a2bad4c7817c1239d57737d4312ac29eddd40121
-
SHA512
b2610aa06445f0cf98f01ce38eb367822dfc8959cc639c507bab05e6d7c8c83fc78c886df80e0b57359079b8be3487177621cea0609417385139376480051ed5
-
SSDEEP
12288:ixDA0l+E8JWyaBte+M1SyD7DAEXqyqQnSMey7SQZy8:iAiBrM1SyD7Duy5g8k8
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-