General
-
Target
MERCADOLIVREATUALIZAÇAO.apk
-
Size
6.2MB
-
Sample
241019-t244hsxgnn
-
MD5
38aba986ef4f4039f268f1f6ce5d1c27
-
SHA1
2fa184815a5a9893b3fcb3b6726609badf709639
-
SHA256
2bfc9388e40d0c959eaa32915f3a16e73d169e65fc9b7433810d0522a8b33d75
-
SHA512
d158c1033e02487d47d48f5798e388860be2d23557f67bf57b8ce81d079f00eba178ec093c59e9b229e91b9ca6496238777c3053d068c996f697ec304003038c
-
SSDEEP
24576:fObEEN10VRUnWqjQW1FRWqdyiqLMssg+KjP:2b1NOjUnWqsW1FQ4PaN7
Behavioral task
behavioral1
Sample
MERCADOLIVREATUALIZAÇAO.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
MERCADOLIVREATUALIZAÇAO.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
spynote
5.tcp.ngrok.io:24969
Targets
-
-
Target
MERCADOLIVREATUALIZAÇAO.apk
-
Size
6.2MB
-
MD5
38aba986ef4f4039f268f1f6ce5d1c27
-
SHA1
2fa184815a5a9893b3fcb3b6726609badf709639
-
SHA256
2bfc9388e40d0c959eaa32915f3a16e73d169e65fc9b7433810d0522a8b33d75
-
SHA512
d158c1033e02487d47d48f5798e388860be2d23557f67bf57b8ce81d079f00eba178ec093c59e9b229e91b9ca6496238777c3053d068c996f697ec304003038c
-
SSDEEP
24576:fObEEN10VRUnWqjQW1FRWqdyiqLMssg+KjP:2b1NOjUnWqsW1FQ4PaN7
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-