General
-
Target
cd00306d04bdf8e2bf79f7176f0714be
-
Size
445KB
-
Sample
240316-d37ysscg72
-
MD5
cd00306d04bdf8e2bf79f7176f0714be
-
SHA1
89ec165c2e1b8feaecaed2964debe1f0ed0ef574
-
SHA256
65430b6906c9d3c94e280d0e8ea98a908f016eeedc02e4ffa01f1e43b9e7f9cc
-
SHA512
5bfb8e92c1a470c6bb95969acba2fc274dc8fb3024a310131c84a531316f5690845c79c411dcbbda0936ca3c7a30ba2eb074245d4fec2863bcbaaea92f98f08f
-
SSDEEP
6144:kaL4aqvHxu0510m5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Au:klaqZu0AD7DAEXqyqQnSMey7SQZyN
Static task
static1
Behavioral task
behavioral1
Sample
cd00306d04bdf8e2bf79f7176f0714be.apk
Resource
android-x86-arm-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
cd00306d04bdf8e2bf79f7176f0714be
-
Size
445KB
-
MD5
cd00306d04bdf8e2bf79f7176f0714be
-
SHA1
89ec165c2e1b8feaecaed2964debe1f0ed0ef574
-
SHA256
65430b6906c9d3c94e280d0e8ea98a908f016eeedc02e4ffa01f1e43b9e7f9cc
-
SHA512
5bfb8e92c1a470c6bb95969acba2fc274dc8fb3024a310131c84a531316f5690845c79c411dcbbda0936ca3c7a30ba2eb074245d4fec2863bcbaaea92f98f08f
-
SSDEEP
6144:kaL4aqvHxu0510m5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Au:klaqZu0AD7DAEXqyqQnSMey7SQZyN
-
XLoader payload
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Reads information about phone network operator.
-