General
-
Target
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f.bin
-
Size
829KB
-
Sample
240712-1zb4aascjn
-
MD5
073830214887ded415365558d8174ddc
-
SHA1
b5b7da56b658bfb305c0c96dae4715af83d72f10
-
SHA256
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f
-
SHA512
ece76599a41e3f700e61aacacb0c960efcc37637a4a07277933429acaca86acd9529c0891a591326e4705b533cf0f20bd19cae2c7b2427461fb271a762e087a4
-
SSDEEP
12288:EgGua1a8LVeXbsUjG1BDdI5R/45WmpYshXZPbGwidNpgd:5a1aKeXbs+G1lm5R/45WmD9idNpi
Behavioral task
behavioral1
Sample
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
192.168.1.10:4447
Targets
-
-
Target
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f.bin
-
Size
829KB
-
MD5
073830214887ded415365558d8174ddc
-
SHA1
b5b7da56b658bfb305c0c96dae4715af83d72f10
-
SHA256
132f45575cf729adf0c20a3728fd07e59decabf66b45b12ad6a16b1e6a1dcc2f
-
SHA512
ece76599a41e3f700e61aacacb0c960efcc37637a4a07277933429acaca86acd9529c0891a591326e4705b533cf0f20bd19cae2c7b2427461fb271a762e087a4
-
SSDEEP
12288:EgGua1a8LVeXbsUjG1BDdI5R/45WmpYshXZPbGwidNpgd:5a1aKeXbs+G1lm5R/45WmD9idNpi
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-