General
-
Target
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50.bin
-
Size
760KB
-
Sample
241019-1w5les1fpd
-
MD5
bdabf5fdc179e3a5d730d93a550fce09
-
SHA1
5d540e7711438d4d6392f4dc51d26845d615a597
-
SHA256
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50
-
SHA512
296ebd40f1e7bff5754966074cee3c82be98df0f92c2f33d1eb453188c38cfb1664ac51a0de9dcfa7d98b327a9f778f3ce06af249aa1e27479f698c4a1c93335
-
SSDEEP
12288:ADM5Fja1a8LVeLjTVdiuY5WmpYshXZPbGwidNpg5h:ADGa1aKeLNdiuY5WmD9idNp4
Behavioral task
behavioral1
Sample
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
23.ip.gl.ply.gg:18904
Targets
-
-
Target
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50.bin
-
Size
760KB
-
MD5
bdabf5fdc179e3a5d730d93a550fce09
-
SHA1
5d540e7711438d4d6392f4dc51d26845d615a597
-
SHA256
76b4629720a15d21a6819f8ac98a001ec8371097f5592f2226a23e509449eb50
-
SHA512
296ebd40f1e7bff5754966074cee3c82be98df0f92c2f33d1eb453188c38cfb1664ac51a0de9dcfa7d98b327a9f778f3ce06af249aa1e27479f698c4a1c93335
-
SSDEEP
12288:ADM5Fja1a8LVeLjTVdiuY5WmpYshXZPbGwidNpg5h:ADGa1aKeLNdiuY5WmD9idNp4
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-