General
-
Target
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb
-
Size
764KB
-
Sample
231220-jap56scgb6
-
MD5
7021967618ce74e38b94e17edaabab76
-
SHA1
ec5660ae6a5a36120f05e8e1bc51e66082f52596
-
SHA256
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb
-
SHA512
112c07a47d969e15bf84973c881f5c59313b1a5316e2b4a3bddea57c2f07842755e0b7abe4e78a49ba9d0ee99d11eb2a8af3866b80df5c85abb8adb2f9735ef2
-
SSDEEP
12288:Cha1a8LreslmlEhR5WmpYshXZPbGwidNpguMo:ua1a2es0lEhR5WmD9idNpt
Behavioral task
behavioral1
Sample
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb.apk
Behavioral task
behavioral2
Sample
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb.apk
Resource
android-x64-20231215-en
Malware Config
Extracted
spynote
7.tcp.eu.ngrok.io:11560
Targets
-
-
Target
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb
-
Size
764KB
-
MD5
7021967618ce74e38b94e17edaabab76
-
SHA1
ec5660ae6a5a36120f05e8e1bc51e66082f52596
-
SHA256
8f91a34b19267651960be4e77de3a0f1de9a18a8c62bf89b24127725fd1f77eb
-
SHA512
112c07a47d969e15bf84973c881f5c59313b1a5316e2b4a3bddea57c2f07842755e0b7abe4e78a49ba9d0ee99d11eb2a8af3866b80df5c85abb8adb2f9735ef2
-
SSDEEP
12288:Cha1a8LreslmlEhR5WmpYshXZPbGwidNpguMo:ua1a2es0lEhR5WmD9idNpt
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-