General
-
Target
230dc1092f2db4bedf15cd5abfcfe893
-
Size
445KB
-
Sample
231231-b2f3ksfbbq
-
MD5
230dc1092f2db4bedf15cd5abfcfe893
-
SHA1
9052b0e2a2186c4151d85b9562a9a33e073c6092
-
SHA256
624339883e6c717c756176cba1e3b12eaa096a84bbaa93726bce0a748e428afd
-
SHA512
f24aaa57c09f59f67556dcb38a3740c47cc7abfd50b8074da8bbd5dfd38e7afe9f2af0881b46e7245b9ea8ec295eac6b2b6cad154d6da7a8d89ca7e2e954817d
-
SSDEEP
12288:YWUv8psXBnCTAte+M1SyD7DAEXqyqQnSMey7SQZyZ:YWlpsXpCTArM1SyD7Duy5g8kZ
Static task
static1
Behavioral task
behavioral1
Sample
230dc1092f2db4bedf15cd5abfcfe893.apk
Resource
android-x86-arm-20231215-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
230dc1092f2db4bedf15cd5abfcfe893
-
Size
445KB
-
MD5
230dc1092f2db4bedf15cd5abfcfe893
-
SHA1
9052b0e2a2186c4151d85b9562a9a33e073c6092
-
SHA256
624339883e6c717c756176cba1e3b12eaa096a84bbaa93726bce0a748e428afd
-
SHA512
f24aaa57c09f59f67556dcb38a3740c47cc7abfd50b8074da8bbd5dfd38e7afe9f2af0881b46e7245b9ea8ec295eac6b2b6cad154d6da7a8d89ca7e2e954817d
-
SSDEEP
12288:YWUv8psXBnCTAte+M1SyD7DAEXqyqQnSMey7SQZyZ:YWlpsXpCTArM1SyD7Duy5g8kZ
Score10/10-
XLoader payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Reads information about phone network operator.
-