General
-
Target
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba.bin
-
Size
777KB
-
Sample
240213-1yxctsaa9t
-
MD5
e4aa97af233f2c85c55182f6c47ab0ce
-
SHA1
f632e2a8a689c96b852866f19f7664a93ce9b3f8
-
SHA256
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba
-
SHA512
7b4cbcc32bca5b7a72eac1bceaa282e574f0150e6628d5d814290cad0c8404987fe77c3f4bb63c5149ad0b6c7566527deaa3d6f99632f0fc89cc3e7c539834da
-
SSDEEP
12288:mQIVTa1a8Lzezx7Mh+HKA5WmpYshXZPbGwidNpgS:TINa1amezxQh2KA5WmD9idNpV
Behavioral task
behavioral1
Sample
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Extracted
spynote
65.0.50.125:22860
Targets
-
-
Target
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba.bin
-
Size
777KB
-
MD5
e4aa97af233f2c85c55182f6c47ab0ce
-
SHA1
f632e2a8a689c96b852866f19f7664a93ce9b3f8
-
SHA256
2c00339c72cf56a325f29bdf33af7334d494c65af83d9bb2f3ba2e561825daba
-
SHA512
7b4cbcc32bca5b7a72eac1bceaa282e574f0150e6628d5d814290cad0c8404987fe77c3f4bb63c5149ad0b6c7566527deaa3d6f99632f0fc89cc3e7c539834da
-
SSDEEP
12288:mQIVTa1a8Lzezx7Mh+HKA5WmpYshXZPbGwidNpgS:TINa1amezxQh2KA5WmD9idNpV
Score8/10-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-