General
-
Target
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.zip
-
Size
14.6MB
-
Sample
241106-c1k6kswjfp
-
MD5
60bd80eadf48d77303ca3aa4e859c4df
-
SHA1
0665819584132bed2f42bf7ba332166b795fd493
-
SHA256
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401
-
SHA512
84df47f26be1c776537d6dc04a485d7ce45ecb0a05bb6a9a0904a2c1495603f16c1c5e80ab9627b379aa94d6b194bb34aac9f0934cd6986a48e6a307ec527634
-
SSDEEP
393216:nVgo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx4:tdUZ5dTKuMMlILMrjyHPE4
Behavioral task
behavioral1
Sample
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
147.185.221.17:5764
Targets
-
-
Target
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401.zip
-
Size
14.6MB
-
MD5
60bd80eadf48d77303ca3aa4e859c4df
-
SHA1
0665819584132bed2f42bf7ba332166b795fd493
-
SHA256
4488a4b12230a9e40b1c03e97fea9884a804cffe82eacf121798223589c1d401
-
SHA512
84df47f26be1c776537d6dc04a485d7ce45ecb0a05bb6a9a0904a2c1495603f16c1c5e80ab9627b379aa94d6b194bb34aac9f0934cd6986a48e6a307ec527634
-
SSDEEP
393216:nVgo++UEBhPQT75d5Zb8RuI1rhMlIPDNQPa0hAcdylFPqC/Dwx4:tdUZ5dTKuMMlILMrjyHPE4
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1