General
-
Target
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.bin
-
Size
760KB
-
Sample
240719-1z2c6swcja
-
MD5
2851d376bcbdbbb92e2bdfe8bc277dab
-
SHA1
0a0fa4d46566db3125ee6924d6b198bf974fad62
-
SHA256
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e
-
SHA512
8c71cb8ec362d86d9624184db85501ba6af3fcce110b5719895c1258b7ad80e31a7695562eeb7b4fe812fe7bc41c03eeea6c36475b47f4b6c0a0d4073c23c620
-
SSDEEP
12288:J+JBjkAgMsFMjIPRjL5/RG941IfvNld6dlv:J+jFsFdRjL5J2fvNqd9
Behavioral task
behavioral1
Sample
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
192.168.1.20:4444
Targets
-
-
Target
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e.bin
-
Size
760KB
-
MD5
2851d376bcbdbbb92e2bdfe8bc277dab
-
SHA1
0a0fa4d46566db3125ee6924d6b198bf974fad62
-
SHA256
5159dab6d2c78ae8f1e873f2d9b3ba0e7576e45b152f7bfcda835db78488a76e
-
SHA512
8c71cb8ec362d86d9624184db85501ba6af3fcce110b5719895c1258b7ad80e31a7695562eeb7b4fe812fe7bc41c03eeea6c36475b47f4b6c0a0d4073c23c620
-
SSDEEP
12288:J+JBjkAgMsFMjIPRjL5/RG941IfvNld6dlv:J+jFsFdRjL5J2fvNqd9
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-