General
-
Target
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.bin
-
Size
3.3MB
-
Sample
241103-1ym46aykcn
-
MD5
f6d0dbbbc050d7d84a7627c8fc16586e
-
SHA1
3c5a792b5724aa1260b466b40e8f7a6f36606754
-
SHA256
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3
-
SHA512
41eff631737fd7bfe5bc131bb48d62f13cb75610117aa965194dfa849086b4258577a1b5fe33952639e66170544989bfc50fd177b7bb96cc4211e9fdffacef96
-
SSDEEP
49152:Ea1aSJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/fKrWk0d/N:m+vYKo3K6aitaYGnfrmykTdo
Behavioral task
behavioral1
Sample
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
212.15.49.32:9595
Targets
-
-
Target
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3.bin
-
Size
3.3MB
-
MD5
f6d0dbbbc050d7d84a7627c8fc16586e
-
SHA1
3c5a792b5724aa1260b466b40e8f7a6f36606754
-
SHA256
db35c5dbc795dc0fe83cb59ee7f2e19e39b576378337e4bdaecaba948364bbc3
-
SHA512
41eff631737fd7bfe5bc131bb48d62f13cb75610117aa965194dfa849086b4258577a1b5fe33952639e66170544989bfc50fd177b7bb96cc4211e9fdffacef96
-
SSDEEP
49152:Ea1aSJ6sq7avYKo3K6TgrPitfyblFg4ggnnfrmipQWk0d/fKrWk0d/N:m+vYKo3K6aitaYGnfrmykTdo
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-