General
-
Target
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1.bin
-
Size
744KB
-
Sample
240416-1w5w7afc6t
-
MD5
080532f5b557453a4625fd58094c0489
-
SHA1
794789af286c4fb0c27f21c0d4b20b868dca35ba
-
SHA256
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1
-
SHA512
65be02d25670750624fda58988987cee562ee19cfd70c0b4cb76a54e445ff0120f944ccda89dd799b9ea767c3b399a8f9f2c0dab5d8a45683bc88aad2fcdc872
-
SSDEEP
12288:usZmRGkBX0yh2+x6FQV/ISRkC8xLl8gJP1jAjD6Lr:usZmJSywW6KJISRkCul8gJPijm
Behavioral task
behavioral1
Sample
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
spynote
193.161.193.99:31895
Targets
-
-
Target
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1.bin
-
Size
744KB
-
MD5
080532f5b557453a4625fd58094c0489
-
SHA1
794789af286c4fb0c27f21c0d4b20b868dca35ba
-
SHA256
1ae5a4d05533ec92728e18c4a581aa2242463216f582021d547ccc30cf321ce1
-
SHA512
65be02d25670750624fda58988987cee562ee19cfd70c0b4cb76a54e445ff0120f944ccda89dd799b9ea767c3b399a8f9f2c0dab5d8a45683bc88aad2fcdc872
-
SSDEEP
12288:usZmRGkBX0yh2+x6FQV/ISRkC8xLl8gJP1jAjD6Lr:usZmJSywW6KJISRkCul8gJPijm
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-