General
-
Target
c760696dc872beca25affd5348198dd1
-
Size
445KB
-
Sample
240314-b71deahh23
-
MD5
c760696dc872beca25affd5348198dd1
-
SHA1
d1a878cfb159caa5c06703bb1e17ecd11626b8a1
-
SHA256
6d3de145215df41012f93588abb8d622f820d483c9d057b1eb8d2478a7970f05
-
SHA512
1a0cdef7b3a46be43003f3669fdc96d3482a1ab37e19382e366ebea38df08a56f41d32ed59f312c460c479f7f94158eb4c5df87eaedef481eef5d18f911ff584
-
SSDEEP
6144:P7Xhv6XpzGgt/gm5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+AL:jXhsJeD7DAEXqyqQnSMey7SQZya
Static task
static1
Behavioral task
behavioral1
Sample
c760696dc872beca25affd5348198dd1.apk
Resource
android-x86-arm-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
c760696dc872beca25affd5348198dd1
-
Size
445KB
-
MD5
c760696dc872beca25affd5348198dd1
-
SHA1
d1a878cfb159caa5c06703bb1e17ecd11626b8a1
-
SHA256
6d3de145215df41012f93588abb8d622f820d483c9d057b1eb8d2478a7970f05
-
SHA512
1a0cdef7b3a46be43003f3669fdc96d3482a1ab37e19382e366ebea38df08a56f41d32ed59f312c460c479f7f94158eb4c5df87eaedef481eef5d18f911ff584
-
SSDEEP
6144:P7Xhv6XpzGgt/gm5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+AL:jXhsJeD7DAEXqyqQnSMey7SQZya
-
XLoader payload
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Reads information about phone network operator.
-