General
-
Target
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.bin
-
Size
750KB
-
Sample
240206-1xqhwshce5
-
MD5
e7969507b6db67d08d6c319273ea94af
-
SHA1
42273f9cdf9c52d3ac852e8ae4fee56ec8504559
-
SHA256
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0
-
SHA512
281de7039de2e6f984ee7981b62df7445c22dc30d3622cfd348cfe58ecd4db8f8dde874559420ab7475de498356ce404eb94c6938cd9a3076103171a326b0a65
-
SSDEEP
12288:tAGala1a8LVerIZs2B55WmpYshXZPbGwidNpgA:t8a1aKer0s2B55WmD9idNpr
Behavioral task
behavioral1
Sample
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
spynote
192.168.1.21:5425
Targets
-
-
Target
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0.bin
-
Size
750KB
-
MD5
e7969507b6db67d08d6c319273ea94af
-
SHA1
42273f9cdf9c52d3ac852e8ae4fee56ec8504559
-
SHA256
595495a43d7d79690c7f44803bcd3d93f97c53acb1681de42aae3ce2f55dc2e0
-
SHA512
281de7039de2e6f984ee7981b62df7445c22dc30d3622cfd348cfe58ecd4db8f8dde874559420ab7475de498356ce404eb94c6938cd9a3076103171a326b0a65
-
SSDEEP
12288:tAGala1a8LVerIZs2B55WmpYshXZPbGwidNpgA:t8a1aKer0s2B55WmD9idNpr
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-