General
-
Target
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6
-
Size
10.7MB
-
Sample
240209-kyq8tabf95
-
MD5
33f6f371f32b69b59cb949e0077511ed
-
SHA1
0c72cb9102071a9de16ede7701e567f8c64d7c2b
-
SHA256
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6
-
SHA512
a92bfd80f1a4256ea2334a91e3fe35680dc83304a867c7319b963059ed6d525754cdbea8a73bb6a22df9cfcfaf47110c42959b77343742819a3daf0faae25880
-
SSDEEP
196608:zh+5cu64PQvuEa1VGq6kvBNsOf3wR8RlO+7gfZ+lBjBGYXUxhnOpfFDHOM:zCL7oxhqlwo3wMlOSW+lhkpheFDt
Behavioral task
behavioral1
Sample
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
spynote
3.122.194.86:7771
Targets
-
-
Target
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6
-
Size
10.7MB
-
MD5
33f6f371f32b69b59cb949e0077511ed
-
SHA1
0c72cb9102071a9de16ede7701e567f8c64d7c2b
-
SHA256
478b44e3615102769dbf4bbe727003be3113139b1554d3c9bd46d9ef60323eb6
-
SHA512
a92bfd80f1a4256ea2334a91e3fe35680dc83304a867c7319b963059ed6d525754cdbea8a73bb6a22df9cfcfaf47110c42959b77343742819a3daf0faae25880
-
SSDEEP
196608:zh+5cu64PQvuEa1VGq6kvBNsOf3wR8RlO+7gfZ+lBjBGYXUxhnOpfFDHOM:zCL7oxhqlwo3wMlOSW+lhkpheFDt
Score8/10-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-