General
-
Target
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.bin
-
Size
760KB
-
Sample
240613-gd2bhawdnf
-
MD5
37dd03ddca420a394191620ad235297a
-
SHA1
3be1b5e54d243429d69ea9680ca8fcaba6a63930
-
SHA256
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763
-
SHA512
c7361d7e93bab36d659d3f1d7806494441e0c2d11658891942424046bf33d3f509700004a50a704b7aac9e51d5c442a2f51c9e541c1bc3538a6288ac426576ad
-
SSDEEP
12288:KR86KC2ja1a8LdeUtyMkAJB5WmpYshXZPbGwidNpgu:KW6Ea1a6eUZkAJB5WmD9idNpR
Behavioral task
behavioral1
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Extracted
spynote
0.tcp.ngrok.io:14051
Targets
-
-
Target
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.bin
-
Size
760KB
-
MD5
37dd03ddca420a394191620ad235297a
-
SHA1
3be1b5e54d243429d69ea9680ca8fcaba6a63930
-
SHA256
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763
-
SHA512
c7361d7e93bab36d659d3f1d7806494441e0c2d11658891942424046bf33d3f509700004a50a704b7aac9e51d5c442a2f51c9e541c1bc3538a6288ac426576ad
-
SSDEEP
12288:KR86KC2ja1a8LdeUtyMkAJB5WmpYshXZPbGwidNpgu:KW6Ea1a6eUZkAJB5WmD9idNpR
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-