General
-
Target
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.bin
-
Size
760KB
-
Sample
241108-1xpxcsznay
-
MD5
3ed9ade08e0b5c31aec010fe264d7c73
-
SHA1
0a073df5e06a907a8756211278fef880c354763e
-
SHA256
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff
-
SHA512
a6b320a129904813de1bc0be5964124a7dc268febd5bbdbc9460510681628b6042f8b6dc02f46cef1be9e5dc86795f70bc71b0d60ead868712f0dcc42ffea846
-
SSDEEP
12288:z+QfWqa1a8LrewbK5STXb5WmpYshXZPbGwidNpgA:z+Ua1a2ew+STXb5WmD9idNpz
Behavioral task
behavioral1
Sample
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
7.tcp.eu.ngrok.io:17357
Targets
-
-
Target
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff.bin
-
Size
760KB
-
MD5
3ed9ade08e0b5c31aec010fe264d7c73
-
SHA1
0a073df5e06a907a8756211278fef880c354763e
-
SHA256
4a9ffd7bb29962d6cc668b4a9c5e65957dc7e3ef02630ce6a01fe0fc871e81ff
-
SHA512
a6b320a129904813de1bc0be5964124a7dc268febd5bbdbc9460510681628b6042f8b6dc02f46cef1be9e5dc86795f70bc71b0d60ead868712f0dcc42ffea846
-
SSDEEP
12288:z+QfWqa1a8LrewbK5STXb5WmpYshXZPbGwidNpgA:z+Ua1a2ew+STXb5WmD9idNpz
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-