General
-
Target
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.bin
-
Size
760KB
-
Sample
240425-1xkmmsfg2x
-
MD5
b7a546586dc2a6fbbad8add46dd0090a
-
SHA1
2ec43ecfc9bb85aac8d22938fe54e5ac76a6a5a8
-
SHA256
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775
-
SHA512
4ac5366f9e78fa0c3fd84c3542eca694c63ba6a63b8556837492b0ce69c202268f28fd39804a88e7a0bdce54ef43c0fbed4b20c7b3fe2eda5ad11b91675583b4
-
SSDEEP
12288:aczMX5ia1a8LzeArGlOPvP5WmpYshXZPbGwidNpgn:aczMYa1ameAKOPvP5WmD9idNps
Behavioral task
behavioral1
Sample
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
spynote
192.168.1.6:4444
Targets
-
-
Target
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775.bin
-
Size
760KB
-
MD5
b7a546586dc2a6fbbad8add46dd0090a
-
SHA1
2ec43ecfc9bb85aac8d22938fe54e5ac76a6a5a8
-
SHA256
120ad33d5f7dddc817bac9434b8f628977fa867b86bdce2f92a62e5e8c6c8775
-
SHA512
4ac5366f9e78fa0c3fd84c3542eca694c63ba6a63b8556837492b0ce69c202268f28fd39804a88e7a0bdce54ef43c0fbed4b20c7b3fe2eda5ad11b91675583b4
-
SSDEEP
12288:aczMX5ia1a8LzeArGlOPvP5WmpYshXZPbGwidNpgn:aczMYa1ameAKOPvP5WmD9idNps
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-