General
-
Target
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b.bin
-
Size
772KB
-
Sample
240519-1w9v5sca79
-
MD5
bec5d0137c1fd845cb2792c03078b437
-
SHA1
749016a733e138499a60963c77144c936d2b40b5
-
SHA256
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b
-
SHA512
40c2dce2107fe6d0c63ba6f70228c5badbf0e49ea9c415cf0331fbfd5c269eca956592e054926d091be4cc8e2f8ab4fb3ad6ef4a0cfbbb138e1b78c95e258368
-
SSDEEP
12288:S4XqSa1a8Lreji47jMLkI5WmpYshXZPbGwidNpgw:S4aSa1a2euSjgkI5WmD9idNpf
Behavioral task
behavioral1
Sample
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
spynote
download-faith.gl.at.ply.gg:54689
Targets
-
-
Target
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b.bin
-
Size
772KB
-
MD5
bec5d0137c1fd845cb2792c03078b437
-
SHA1
749016a733e138499a60963c77144c936d2b40b5
-
SHA256
febaa2619817c8642b30c338cd0624e345910d6332745560def8e0be07a60c3b
-
SHA512
40c2dce2107fe6d0c63ba6f70228c5badbf0e49ea9c415cf0331fbfd5c269eca956592e054926d091be4cc8e2f8ab4fb3ad6ef4a0cfbbb138e1b78c95e258368
-
SSDEEP
12288:S4XqSa1a8Lreji47jMLkI5WmpYshXZPbGwidNpgw:S4aSa1a2euSjgkI5WmD9idNpf
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-