General
-
Target
cbba07cac36c13850c1c0898d00bfbd0.bin
-
Size
3.8MB
-
Sample
230916-cxqxnabb47
-
MD5
cbba07cac36c13850c1c0898d00bfbd0
-
SHA1
5a4dc213d4cf6461d8a5ac1c8b49dd5fefdca459
-
SHA256
5e18b2f454ef7536d3301f72a53ced7827d0032eb479aeca1001095df9eefda4
-
SHA512
fecfad88630c519e0ed3aa9efc6a6303151fa742477959b97390d5fee665c65ca045fae81d826425987ed30bd19939a60612db048bf9107c91e1a5687e15841e
-
SSDEEP
98304:aup12jvFp+CQNaI87791LehbimzTzBtTA0tQasb5G:aup6QNy+NzjrQG
Behavioral task
behavioral1
Sample
cbba07cac36c13850c1c0898d00bfbd0.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
cbba07cac36c13850c1c0898d00bfbd0.apk
Resource
android-x64-20230831-en
Malware Config
Extracted
spynote
fee-harmful.gl.at.ply.gg:41934
Targets
-
-
Target
cbba07cac36c13850c1c0898d00bfbd0.bin
-
Size
3.8MB
-
MD5
cbba07cac36c13850c1c0898d00bfbd0
-
SHA1
5a4dc213d4cf6461d8a5ac1c8b49dd5fefdca459
-
SHA256
5e18b2f454ef7536d3301f72a53ced7827d0032eb479aeca1001095df9eefda4
-
SHA512
fecfad88630c519e0ed3aa9efc6a6303151fa742477959b97390d5fee665c65ca045fae81d826425987ed30bd19939a60612db048bf9107c91e1a5687e15841e
-
SSDEEP
98304:aup12jvFp+CQNaI87791LehbimzTzBtTA0tQasb5G:aup6QNy+NzjrQG
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-