General
-
Target
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.bin
-
Size
760KB
-
Sample
240713-1ynqpa1erh
-
MD5
3f4d8716c61776b795f651bca91c8c65
-
SHA1
6e456a53bd69a1c01a96f237f6eef041dc0c209a
-
SHA256
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8
-
SHA512
87c3c68124d55aff7beeb4c3532d4ad87886ba7618983f42a8349e2ab80c798b577a1bc0675a34b32792e336fd73c61921b6a849f4cf4f231cb5eea1d475c86a
-
SSDEEP
12288:n6zxFdJ6sgR8Lzp95eDxwy5WmpYshXZPbGwidNpg/3o:n6zVJ6stLzp6Dxwy5WmD9idNp+o
Behavioral task
behavioral1
Sample
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
0.tcp.sa.ngrok.io:19280
Targets
-
-
Target
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8.bin
-
Size
760KB
-
MD5
3f4d8716c61776b795f651bca91c8c65
-
SHA1
6e456a53bd69a1c01a96f237f6eef041dc0c209a
-
SHA256
f28cefd85d117b4c8de16b68a6c3bfc9b23977eb0e68d4c2222a18adbfbcb9d8
-
SHA512
87c3c68124d55aff7beeb4c3532d4ad87886ba7618983f42a8349e2ab80c798b577a1bc0675a34b32792e336fd73c61921b6a849f4cf4f231cb5eea1d475c86a
-
SSDEEP
12288:n6zxFdJ6sgR8Lzp95eDxwy5WmpYshXZPbGwidNpg/3o:n6zVJ6stLzp6Dxwy5WmD9idNp+o
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-