General
-
Target
660159f431b5f8ec8c4fed0298168d1a
-
Size
663KB
-
Sample
240517-w2cqdacf73
-
MD5
660159f431b5f8ec8c4fed0298168d1a
-
SHA1
d738fd0844dcfa47ebdf53d835ab130f2132a6c2
-
SHA256
107169ae6951a5cba57d2a0cd274e28fadf5c73d73e91a386f15cf4dc35edd38
-
SHA512
26514f82078177e0d7e5c42c71af832494913eb68dce7f6107b1f468a43c37b98b1007ad46ee18bf3e24f147f2025f3ec1e9bb26c48f2a69ff07ff02355f39e3
-
SSDEEP
12288:TKdla+OAnycLhuDoQ/GbJ7VKQZFM/2tvPiGrZ:4N9nTOoQ/G97VKQZrHiG
Static task
static1
Behavioral task
behavioral1
Sample
660159f431b5f8ec8c4fed0298168d1a.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
660159f431b5f8ec8c4fed0298168d1a.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
660159f431b5f8ec8c4fed0298168d1a.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
660159f431b5f8ec8c4fed0298168d1a
-
Size
663KB
-
MD5
660159f431b5f8ec8c4fed0298168d1a
-
SHA1
d738fd0844dcfa47ebdf53d835ab130f2132a6c2
-
SHA256
107169ae6951a5cba57d2a0cd274e28fadf5c73d73e91a386f15cf4dc35edd38
-
SHA512
26514f82078177e0d7e5c42c71af832494913eb68dce7f6107b1f468a43c37b98b1007ad46ee18bf3e24f147f2025f3ec1e9bb26c48f2a69ff07ff02355f39e3
-
SSDEEP
12288:TKdla+OAnycLhuDoQ/GbJ7VKQZFM/2tvPiGrZ:4N9nTOoQ/G97VKQZrHiG
-
Spynote payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests dangerous framework permissions
-