General
-
Target
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15.bin
-
Size
760KB
-
Sample
240715-1zdl4stgpf
-
MD5
724e728695041d4c5e8a37c5862f6929
-
SHA1
ee51298a4c3678f67dbe68f06b48d1b2158d0eda
-
SHA256
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15
-
SHA512
b3312ac09b406950de88fdd6293ff1815ad14f6ff47b413045a2e903067e0fc85e606e9bb3d20119620685a546f76dd7e46aa4c5f7fde2319be1d9b44d8d8e34
-
SSDEEP
12288:j2FVna1a8Lze0byRyfLz5WmpYshXZPbGwidNpgzkl:jAa1ame0yyfLz5WmD9idNpN
Behavioral task
behavioral1
Sample
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
Ruzel-45921.portmap.host:45921
Targets
-
-
Target
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15.bin
-
Size
760KB
-
MD5
724e728695041d4c5e8a37c5862f6929
-
SHA1
ee51298a4c3678f67dbe68f06b48d1b2158d0eda
-
SHA256
9727552e65358424a00406cc92b6c19fa1792e2a9bc769360654b54bcd38ce15
-
SHA512
b3312ac09b406950de88fdd6293ff1815ad14f6ff47b413045a2e903067e0fc85e606e9bb3d20119620685a546f76dd7e46aa4c5f7fde2319be1d9b44d8d8e34
-
SSDEEP
12288:j2FVna1a8Lze0byRyfLz5WmpYshXZPbGwidNpgzkl:jAa1ame0yyfLz5WmD9idNpN
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-