General
-
Target
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071.bin
-
Size
739KB
-
Sample
240407-1w8cbafh87
-
MD5
d66ccb14faa1455980611e3fc467f6ed
-
SHA1
6b4d0ca1075d3f60dfd7ae89a5148947359b9293
-
SHA256
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071
-
SHA512
d5bcce1e478bd3e901649efdbabdaa49d91f0aae75a3f24e121634871e17307b0d1a79ece79f8639516ab65279245084aac216269e0b0cbb65ef97f36a706f67
-
SSDEEP
12288:yWlJ6sgRALz4I2sVrE5WmpYshXZPbGwidNpgV:yqJ6s7Lz4nsVrE5WmD9idNpa
Behavioral task
behavioral1
Sample
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
spynote
learsyx.duckdns.org:5214
Targets
-
-
Target
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071.bin
-
Size
739KB
-
MD5
d66ccb14faa1455980611e3fc467f6ed
-
SHA1
6b4d0ca1075d3f60dfd7ae89a5148947359b9293
-
SHA256
55325199311b4c12b5fda133c7b2186eab289ba1062a96b079ef6efa11cb8071
-
SHA512
d5bcce1e478bd3e901649efdbabdaa49d91f0aae75a3f24e121634871e17307b0d1a79ece79f8639516ab65279245084aac216269e0b0cbb65ef97f36a706f67
-
SSDEEP
12288:yWlJ6sgRALz4I2sVrE5WmpYshXZPbGwidNpgV:yqJ6s7Lz4nsVrE5WmD9idNpa
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-