General
-
Target
54d58ec4d05f837a101fa08f94bb98db.bin
-
Size
480KB
-
Sample
240515-c6zk6add7z
-
MD5
1aeba284a64eb6192b6221804ae80c72
-
SHA1
1cdec88c922a2c8a1c0583d63f0dbac952364add
-
SHA256
3e19520ac96d875d409cc9c01f5067228c9877b3b1ab190ca23d44dff4055977
-
SHA512
2430338222cdb446054a5a581aaa9f9a2acc11f4db830f7c7e456888eb6caa594ccb5da3a73e5dc6b72083427a18f13356738b0099ea61dd57ea9e113ee1db54
-
SSDEEP
12288:AoNws0STE5B+SW52KvF+MwwTBmAtyTtQmu7wZkWk/k/lGgsxnqnv2n:ZwsZOGpwwTByTtpZtOoG/5D
Behavioral task
behavioral1
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
spynote
4.194.25.153:5214
Targets
-
-
Target
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
-
Size
760KB
-
MD5
54d58ec4d05f837a101fa08f94bb98db
-
SHA1
77a2853ad6f0402183806899d801b79c0091cf61
-
SHA256
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f
-
SHA512
47b66a05d9b8e9588b5a82eeff367c79a4ff0102388f2c3cf0202cd6ae2ca306b5c12c450877d4c66d60ca9fc1855e5523f16cdcb7de9d65a25e9ccca2b295ab
-
SSDEEP
12288:Lw8MOAsa1a8Lde9/NhRmmw5WmpYshXZPbGwidNpg/FD:LwL0a1a6e9fRmmw5WmD9idNpyN
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-