General
-
Target
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5.bin
-
Size
3.2MB
-
Sample
240717-1y7tka1fpr
-
MD5
5fd177c195300553493b53858e3e0cb0
-
SHA1
2fff08b752e91fb4e040015040dc28ccaacd8298
-
SHA256
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5
-
SHA512
1763b0dae0e81f33797a3110fd4cf855cc09f0fe311a90f83a0013a2483ebc395e64dd0bc6d1102668b042cd03a5e74be73eec5798aa7d623e9e165cc86f0853
-
SSDEEP
49152:2J6s7uryN8O5jgjQb/VYUlnFn4z8Xlhgd9e94VticbZE9Ejv/nqXCGc/Y2B6GmWO:fryC+j2QrV314chroicPz/qXt2TmH
Behavioral task
behavioral1
Sample
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
spynote
0.tcp.ngrok.io:13526
Targets
-
-
Target
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5.bin
-
Size
3.2MB
-
MD5
5fd177c195300553493b53858e3e0cb0
-
SHA1
2fff08b752e91fb4e040015040dc28ccaacd8298
-
SHA256
ca6216bc6b7936cc49e86a8fb883f2d48598745b1efbaf105273d46d10a571a5
-
SHA512
1763b0dae0e81f33797a3110fd4cf855cc09f0fe311a90f83a0013a2483ebc395e64dd0bc6d1102668b042cd03a5e74be73eec5798aa7d623e9e165cc86f0853
-
SSDEEP
49152:2J6s7uryN8O5jgjQb/VYUlnFn4z8Xlhgd9e94VticbZE9Ejv/nqXCGc/Y2B6GmWO:fryC+j2QrV314chroicPz/qXt2TmH
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-