General
-
Target
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.bin
-
Size
760KB
-
Sample
241006-124lbaydmr
-
MD5
230986f6152a3b0a898bca6869847d98
-
SHA1
0922174d3244baf0181e905e1c22216f86415ec0
-
SHA256
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc
-
SHA512
3228f3ca94e2addb1242c616ce3d7c6276df184744a446be32051f26b98c234b80c899b3bd32d05d1055934135bdfb84a24e96e11f89d22e1eb41c9e8c385368
-
SSDEEP
12288:tPV6sa1a8Ldej9X0x27AKY5WmpYshXZPbGwidNpgt:tPfa1a6ejix8AKY5WmD9idNpK
Behavioral task
behavioral1
Sample
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
advertising-evil.gl.at.ply.gg:7463
Targets
-
-
Target
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc.bin
-
Size
760KB
-
MD5
230986f6152a3b0a898bca6869847d98
-
SHA1
0922174d3244baf0181e905e1c22216f86415ec0
-
SHA256
15252dab0ea1545375e816146a323e001c0f1284ebe404ccf24cc58721707adc
-
SHA512
3228f3ca94e2addb1242c616ce3d7c6276df184744a446be32051f26b98c234b80c899b3bd32d05d1055934135bdfb84a24e96e11f89d22e1eb41c9e8c385368
-
SSDEEP
12288:tPV6sa1a8Ldej9X0x27AKY5WmpYshXZPbGwidNpgt:tPfa1a6ejix8AKY5WmD9idNpK
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-