General
-
Target
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79.bin
-
Size
769KB
-
Sample
241013-127mzavhnk
-
MD5
3a8c58334651d1d1bd00ee52fc31912a
-
SHA1
6ca6eed669fcee16617efd64880d2ca4dd24add3
-
SHA256
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79
-
SHA512
4982e67ac3833e552f5055e58a8c9ace35b245b3adff3ed450a4fb77325b90c6d950d725464b4786bbab71e99cb61ad798bc81e8cc48d452a7ec9d316dea829a
-
SSDEEP
12288:zkFXJ6sgRALzzy+Jix0Ub75WmpYshXZPbGwidNpgZ:AxJ6sjLzG6ixVb75WmD9idNp6
Behavioral task
behavioral1
Sample
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
4.tcp.eu.ngrok.io:10406
Targets
-
-
Target
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79.bin
-
Size
769KB
-
MD5
3a8c58334651d1d1bd00ee52fc31912a
-
SHA1
6ca6eed669fcee16617efd64880d2ca4dd24add3
-
SHA256
e24247c130c99e706424a549a759ec625a625c137180826ac1f4bef6bff48c79
-
SHA512
4982e67ac3833e552f5055e58a8c9ace35b245b3adff3ed450a4fb77325b90c6d950d725464b4786bbab71e99cb61ad798bc81e8cc48d452a7ec9d316dea829a
-
SSDEEP
12288:zkFXJ6sgRALzzy+Jix0Ub75WmpYshXZPbGwidNpgZ:AxJ6sjLzG6ixVb75WmD9idNp6
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-