General
-
Target
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d.bin
-
Size
786KB
-
Sample
241001-hf2wgszclg
-
MD5
bc8e11af550a6b134c3261297863ae34
-
SHA1
65d3efb6c67f50296aaf979c9f3f18c7897d9607
-
SHA256
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d
-
SHA512
d01f5b010b72620920ddbbec762c51453aa64df293d9db066e99e9adf5b301dba4db5a96235af40e1d537fc5177b8d4cc850784b7b9a4d0799b671a7daf954ce
-
SSDEEP
12288:AZ0a1a8LdeViGuqDAvDe5WmpYshXZPbGwidNpgWi:Aua1a6eVhuqUDe5WmD9idNpRi
Behavioral task
behavioral1
Sample
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
deals-hu.gl.at.ply.gg:12799
Targets
-
-
Target
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d.bin
-
Size
786KB
-
MD5
bc8e11af550a6b134c3261297863ae34
-
SHA1
65d3efb6c67f50296aaf979c9f3f18c7897d9607
-
SHA256
891e7983a831dd3c159591cf17ca66b4197a2498bd0908362473dbce6c48f32d
-
SHA512
d01f5b010b72620920ddbbec762c51453aa64df293d9db066e99e9adf5b301dba4db5a96235af40e1d537fc5177b8d4cc850784b7b9a4d0799b671a7daf954ce
-
SSDEEP
12288:AZ0a1a8LdeViGuqDAvDe5WmpYshXZPbGwidNpgWi:Aua1a6eVhuqUDe5WmD9idNpRi
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-