General
-
Target
client.apk
-
Size
760KB
-
Sample
241009-wtnsns1cmm
-
MD5
76f6f69a37070118ef2a01de90dc88f5
-
SHA1
c75357b217c6c69670abbe34870f2393e7561870
-
SHA256
49b0017346e269f209e45e89cde6541af3ab775640b06df9b1df96503e50cfae
-
SHA512
83f11a94343b385c44a89116add7380ac55700768edad56fb6dd2904b11a3ebae4bff847aafeebd9052b63a9887983e7c03962926816672ccbf32617a95282ab
-
SSDEEP
12288:dxAYNa1a8LrenzDjDMc25WmpYshXZPbGwidNpgi:dTa1a2enTDMc25WmD9idNpV
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
client.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
Ezling-25441.portmap.host:25441
Targets
-
-
Target
client.apk
-
Size
760KB
-
MD5
76f6f69a37070118ef2a01de90dc88f5
-
SHA1
c75357b217c6c69670abbe34870f2393e7561870
-
SHA256
49b0017346e269f209e45e89cde6541af3ab775640b06df9b1df96503e50cfae
-
SHA512
83f11a94343b385c44a89116add7380ac55700768edad56fb6dd2904b11a3ebae4bff847aafeebd9052b63a9887983e7c03962926816672ccbf32617a95282ab
-
SSDEEP
12288:dxAYNa1a8LrenzDjDMc25WmpYshXZPbGwidNpgi:dTa1a2enTDMc25WmD9idNpV
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-