General
-
Target
Youtube Bypass.apk
-
Size
3.7MB
-
Sample
230914-bzvsysbc45
-
MD5
d75f3814bbc3ff314f080df024fc53d9
-
SHA1
83da2cf64b39491e0f19fe6993f708f2f6bfdd1b
-
SHA256
c7568d7b54a0be47351e3f70952ad64599e8a5faf644b8284f4890c2fa5c1729
-
SHA512
066963f319fe520e4f0bcfd7c9429a110215262501f5471da17ccb5fc39e5b3c4dcd460e80591084686b8dd5cc3cf053674bc999884c0cf65c5f2d8257dad9eb
-
SSDEEP
49152:JisbmhRsC5vj9yHZY9F5A45mMsqmzDzdGGMQTOV7UjYqh0cg8EVuik1jk:JisbwsC5oq9F52dqmzDzBrTf0t8EmI
Malware Config
Extracted
spynote
fee-harmful.gl.at.ply.gg:41934
Targets
-
-
Target
Youtube Bypass.apk
-
Size
3.7MB
-
MD5
d75f3814bbc3ff314f080df024fc53d9
-
SHA1
83da2cf64b39491e0f19fe6993f708f2f6bfdd1b
-
SHA256
c7568d7b54a0be47351e3f70952ad64599e8a5faf644b8284f4890c2fa5c1729
-
SHA512
066963f319fe520e4f0bcfd7c9429a110215262501f5471da17ccb5fc39e5b3c4dcd460e80591084686b8dd5cc3cf053674bc999884c0cf65c5f2d8257dad9eb
-
SSDEEP
49152:JisbmhRsC5vj9yHZY9F5A45mMsqmzDzdGGMQTOV7UjYqh0cg8EVuik1jk:JisbwsC5oq9F52dqmzDzBrTf0t8EmI
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Tries to add a device administrator.
-
Removes a system notification.
-