General
-
Target
ready.apk
-
Size
6.2MB
-
Sample
230912-cs4mysdc82
-
MD5
46d231b38c3f237cd6a145933bf7901a
-
SHA1
4f48d7bc52d4b7fcaaee020a7b422b84038c4bd8
-
SHA256
ddec4455e46897c7220547c50223855003a1d4e938cc11764fa9f9d0b6b9d6c1
-
SHA512
595d9fe79599318e0c892df06a102a868804aa049802d2ffeb1573624f9848ec2d47f1ef2da4f24412281e41a810da0dc32638b238594d2a57e077d08b7319b7
-
SSDEEP
24576:31wZOVrx+KsT/vt7uijz2XL0KxgVuG4KgWeYCS:Oc3+J/vpuijzY08MuselS
Malware Config
Extracted
spynote
fee-harmful.gl.at.ply.gg:41934
Targets
-
-
Target
ready.apk
-
Size
6.2MB
-
MD5
46d231b38c3f237cd6a145933bf7901a
-
SHA1
4f48d7bc52d4b7fcaaee020a7b422b84038c4bd8
-
SHA256
ddec4455e46897c7220547c50223855003a1d4e938cc11764fa9f9d0b6b9d6c1
-
SHA512
595d9fe79599318e0c892df06a102a868804aa049802d2ffeb1573624f9848ec2d47f1ef2da4f24412281e41a810da0dc32638b238594d2a57e077d08b7319b7
-
SSDEEP
24576:31wZOVrx+KsT/vt7uijz2XL0KxgVuG4KgWeYCS:Oc3+J/vpuijzY08MuselS
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-