General
-
Target
Android Telegram.apk
-
Size
3.0MB
-
Sample
240914-ptf99svapa
-
MD5
66c4513025128719dda018820cc0987e
-
SHA1
4dcc2d9ef4921b3eb4e4dc72dd3716520d558102
-
SHA256
c19cf001efb893cfb4f3aedb1c4c3771ce8419d3838e1bc399e88a12b583b28c
-
SHA512
dd5ed77e8f110ceafe036adcf673dfb77b46e78d23815abcf25cbe08ad6631bf6c348bdab49ca497ed44c77c1ad0b19425fd8ed44063cb1da8dbe9b84fab49bd
-
SSDEEP
49152:HYvtHWc3kQdaWWce2fFeeC6K6iZHyqDmLJTsY2424rTOoQE2jvKuAz:Hodz3kQAW3ft9CH79dD2JNvS+
Static task
static1
Behavioral task
behavioral1
Sample
Android Telegram.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Android Telegram.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
Android Telegram.apk
-
Size
3.0MB
-
MD5
66c4513025128719dda018820cc0987e
-
SHA1
4dcc2d9ef4921b3eb4e4dc72dd3716520d558102
-
SHA256
c19cf001efb893cfb4f3aedb1c4c3771ce8419d3838e1bc399e88a12b583b28c
-
SHA512
dd5ed77e8f110ceafe036adcf673dfb77b46e78d23815abcf25cbe08ad6631bf6c348bdab49ca497ed44c77c1ad0b19425fd8ed44063cb1da8dbe9b84fab49bd
-
SSDEEP
49152:HYvtHWc3kQdaWWce2fFeeC6K6iZHyqDmLJTsY2424rTOoQE2jvKuAz:Hodz3kQAW3ft9CH79dD2JNvS+
-
Spynote payload
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests dangerous framework permissions
-