General
-
Target
b3a26b6790a64b407b826863c7b53585
-
Size
445KB
-
Sample
240305-dr675adh78
-
MD5
b3a26b6790a64b407b826863c7b53585
-
SHA1
b9523ebde06086f3cad3e29cf656a361bca61ac9
-
SHA256
e12de59f23aaa6bef7f94182bab229fa3a5418329c7762eb5cf0303799145a9e
-
SHA512
ac3719711a11a059e1f418ec3a7343e17e5003773fd9c1b45e6e6614b6322b407ff416b1e5918f5d3256b836d2a5fe840822ac660e4879aad3bbced67c858724
-
SSDEEP
12288:Yg9HQj9/qnA7agvETP4gte+M1SyD7DAEXqyqQnSMey7SQZyR:HHQZ/U6nsr1rM1SyD7Duy5g8kR
Static task
static1
Behavioral task
behavioral1
Sample
b3a26b6790a64b407b826863c7b53585.apk
Resource
android-x86-arm-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
b3a26b6790a64b407b826863c7b53585
-
Size
445KB
-
MD5
b3a26b6790a64b407b826863c7b53585
-
SHA1
b9523ebde06086f3cad3e29cf656a361bca61ac9
-
SHA256
e12de59f23aaa6bef7f94182bab229fa3a5418329c7762eb5cf0303799145a9e
-
SHA512
ac3719711a11a059e1f418ec3a7343e17e5003773fd9c1b45e6e6614b6322b407ff416b1e5918f5d3256b836d2a5fe840822ac660e4879aad3bbced67c858724
-
SSDEEP
12288:Yg9HQj9/qnA7agvETP4gte+M1SyD7DAEXqyqQnSMey7SQZyR:HHQZ/U6nsr1rM1SyD7Duy5g8kR
-
XLoader payload
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Reads information about phone network operator.
-