General
-
Target
ready.apk
-
Size
688KB
-
Sample
240430-qpvsjahf64
-
MD5
61ce7ed4706922efb474f00cb7e12818
-
SHA1
ff93b5510ba65e630993ce19954a29b9cef58564
-
SHA256
2d196b05f4a984be00ff275c6a0ed99e4ce79c6d26302b856e360c4482a4982e
-
SHA512
b0649c8958522d7606f3c68b13d47420a94c30d9323057a23a667c666bc8f03acaca4dc66aa44d1af5f018bc21bf315f1e21d3172c27a403bd4c3b4e1798552b
-
SSDEEP
12288:R1BnXRZztLiOi/HUB4VcCIMnAehbwusT3cgtN0F2g6Rq214gy+tWDmB:9nhZ5Li3PUBAc2AehsHT3SF2gGNN2mB
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-x64-20240221-en
Malware Config
Extracted
spynote
h2cker.ddns.net:194
Extracted
spynote
h2cker.ddns.net:194
Targets
-
-
Target
ready.apk
-
Size
688KB
-
MD5
61ce7ed4706922efb474f00cb7e12818
-
SHA1
ff93b5510ba65e630993ce19954a29b9cef58564
-
SHA256
2d196b05f4a984be00ff275c6a0ed99e4ce79c6d26302b856e360c4482a4982e
-
SHA512
b0649c8958522d7606f3c68b13d47420a94c30d9323057a23a667c666bc8f03acaca4dc66aa44d1af5f018bc21bf315f1e21d3172c27a403bd4c3b4e1798552b
-
SSDEEP
12288:R1BnXRZztLiOi/HUB4VcCIMnAehbwusT3cgtN0F2g6Rq214gy+tWDmB:9nhZ5Li3PUBAc2AehsHT3SF2gGNN2mB
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-