General
-
Target
d2110db05a98311069c20b3ecc2814b7
-
Size
445KB
-
Sample
240318-abl1gaba43
-
MD5
d2110db05a98311069c20b3ecc2814b7
-
SHA1
60441e5b7881d063e849452cbe4af37669f10e0e
-
SHA256
305122d541f3736ce622ad4086235f86017bc56b0821ab409f8687b9b1bace5a
-
SHA512
4b2910eaabc3618e34f98468413a9497e2d8880db804db1e2344ba3c958417603b5082a46c90d6ddb66fa146c8bb65299969ec0431733b20a358993189c22a5b
-
SSDEEP
6144:vUSv4krzSXaIg1iJu10m5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Ax:vf1rOnqiJZD7DAEXqyqQnSMey7SQZyP0
Static task
static1
Behavioral task
behavioral1
Sample
d2110db05a98311069c20b3ecc2814b7.apk
Resource
android-x86-arm-20240221-en
Malware Config
Extracted
xloader_apk
http://91.204.227.39:28844
Targets
-
-
Target
d2110db05a98311069c20b3ecc2814b7
-
Size
445KB
-
MD5
d2110db05a98311069c20b3ecc2814b7
-
SHA1
60441e5b7881d063e849452cbe4af37669f10e0e
-
SHA256
305122d541f3736ce622ad4086235f86017bc56b0821ab409f8687b9b1bace5a
-
SHA512
4b2910eaabc3618e34f98468413a9497e2d8880db804db1e2344ba3c958417603b5082a46c90d6ddb66fa146c8bb65299969ec0431733b20a358993189c22a5b
-
SSDEEP
6144:vUSv4krzSXaIg1iJu10m5C7XrXDDUEW+3qyqPoQ+8QVbSda8lysdWINQZoFSF+Ax:vf1rOnqiJZD7DAEXqyqQnSMey7SQZyP0
-
XLoader payload
-
Reads the contacts stored on the device.
-
Reads the content of the MMS message.
-
Acquires the wake lock
-
Reads information about phone network operator.
-