General
-
Target
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb
-
Size
872KB
-
Sample
231220-c8yrmsghdl
-
MD5
13c92e9f42e088979aec18294243a156
-
SHA1
3874539f9a21449b542529b6f599e0cf73367282
-
SHA256
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb
-
SHA512
74a07a8caa5ac7d74343755c6a2a0b434ccf9bedc57aeeb93c8e8f0331d1a2f808d6a0dbfbac1612138d0cf9c9cfba4c8b2a7546594d71237d2dfa6c73fbc0ce
-
SSDEEP
12288:IiBOchUtZB1XdVTF8k8hic3FIEayUNiDa1a8LM+x8u2Jmn:IOOc8BLf8k8hipRyUYa1aZ+Con
Behavioral task
behavioral1
Sample
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
spynote
185.165.153.172:1337
Targets
-
-
Target
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb
-
Size
872KB
-
MD5
13c92e9f42e088979aec18294243a156
-
SHA1
3874539f9a21449b542529b6f599e0cf73367282
-
SHA256
7e5b04636c88c5c7fbcdf09d0578fbd487ddabc613b5648176d4495483d802eb
-
SHA512
74a07a8caa5ac7d74343755c6a2a0b434ccf9bedc57aeeb93c8e8f0331d1a2f808d6a0dbfbac1612138d0cf9c9cfba4c8b2a7546594d71237d2dfa6c73fbc0ce
-
SSDEEP
12288:IiBOchUtZB1XdVTF8k8hic3FIEayUNiDa1a8LM+x8u2Jmn:IOOc8BLf8k8hipRyUYa1aZ+Con
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-