General
-
Target
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8.bin
-
Size
760KB
-
Sample
241010-11hbpaygkh
-
MD5
9d11a6f85dafce43f0793ad6eabec6cc
-
SHA1
9d5d76f2b38ddc2a6da92745a8982fc231733460
-
SHA256
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8
-
SHA512
63e31e8b22dda8b1de7fda1768b608cd671d20622060abc633da383e41dbe5b985d1edf6cfc830bc9f395d5fc12c38321c6b66e14a1567cdd33fb4d4d0428351
-
SSDEEP
12288:Vq4zja1a8LrePXbvTo8W5WmpYshXZPbGwidNpgA:Vna1a2ePDTo8W5WmD9idNpb
Behavioral task
behavioral1
Sample
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
Ezling-25441.portmap.host:25441
Targets
-
-
Target
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8.bin
-
Size
760KB
-
MD5
9d11a6f85dafce43f0793ad6eabec6cc
-
SHA1
9d5d76f2b38ddc2a6da92745a8982fc231733460
-
SHA256
68e5d5ff28c72586b5c17e556650f358483587fc6561a428b5a3f816425406a8
-
SHA512
63e31e8b22dda8b1de7fda1768b608cd671d20622060abc633da383e41dbe5b985d1edf6cfc830bc9f395d5fc12c38321c6b66e14a1567cdd33fb4d4d0428351
-
SSDEEP
12288:Vq4zja1a8LrePXbvTo8W5WmpYshXZPbGwidNpgA:Vna1a2ePDTo8W5WmD9idNpb
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-