General
-
Target
bfe9803c938c8d83c3f470a0d085dcca
-
Size
445KB
-
Sample
240311-fp5mmach3y
-
MD5
bfe9803c938c8d83c3f470a0d085dcca
-
SHA1
f721d23702a70f56adb80f69d8f2834ce06c08dd
-
SHA256
9b4ec1e853c7cc6451f6fe7c5f1a5d095c3f86d4b55d0e9ac353b996127eb23a
-
SHA512
fca8df09a075074eef5d63d02848dd0caf7aab9b3975f0438890a14cf6d8af01963c365b7f94851617db92ae0322d719e392f8c0509deb84821bb9b6168c5cd6
-
SSDEEP
6144:02NW1ADOv4kXzOpyZ/gm5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Ac:0+W8PvRD7DAEXqyqQnSMey7SQZyeE
Static task
static1
Behavioral task
behavioral1
Sample
bfe9803c938c8d83c3f470a0d085dcca.apk
Resource
android-x86-arm-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
bfe9803c938c8d83c3f470a0d085dcca
-
Size
445KB
-
MD5
bfe9803c938c8d83c3f470a0d085dcca
-
SHA1
f721d23702a70f56adb80f69d8f2834ce06c08dd
-
SHA256
9b4ec1e853c7cc6451f6fe7c5f1a5d095c3f86d4b55d0e9ac353b996127eb23a
-
SHA512
fca8df09a075074eef5d63d02848dd0caf7aab9b3975f0438890a14cf6d8af01963c365b7f94851617db92ae0322d719e392f8c0509deb84821bb9b6168c5cd6
-
SSDEEP
6144:02NW1ADOv4kXzOpyZ/gm5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Ac:0+W8PvRD7DAEXqyqQnSMey7SQZyeE
-
XLoader payload
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Reads information about phone network operator.
-