General
-
Target
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336.bin
-
Size
760KB
-
Sample
240413-1xcl2aad64
-
MD5
f7601807c0d2074fe4f60fe7becc45a1
-
SHA1
a38599241330c767e5fea3f6a3677bfb3fc7ebe2
-
SHA256
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336
-
SHA512
c3eaa635d3526f5971a1dfd432213e2aa870c238011eed0592ff683fe5d343a7093076cb7eea9a5d8c3656d1e8f667702b9d952feff44cc9c1451be984e33017
-
SSDEEP
12288:RcX4zuJwa1a8LrefWmeUK5V5WmpYshXZPbGwidNpgx:Rs4zta1a2efgUK5V5WmD9idNpa
Behavioral task
behavioral1
Sample
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
spynote
windowshell.ddns.net:53
Targets
-
-
Target
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336.bin
-
Size
760KB
-
MD5
f7601807c0d2074fe4f60fe7becc45a1
-
SHA1
a38599241330c767e5fea3f6a3677bfb3fc7ebe2
-
SHA256
f32bad1a9a2cab38a11716a95f1b264d9af5d9212d83d5605bdfdfccab034336
-
SHA512
c3eaa635d3526f5971a1dfd432213e2aa870c238011eed0592ff683fe5d343a7093076cb7eea9a5d8c3656d1e8f667702b9d952feff44cc9c1451be984e33017
-
SSDEEP
12288:RcX4zuJwa1a8LrefWmeUK5V5WmpYshXZPbGwidNpgx:Rs4zta1a2efgUK5V5WmD9idNpa
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-