General
-
Target
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a.bin
-
Size
760KB
-
Sample
241108-2mqlks1jet
-
MD5
a86c7da0387b37d3dff94c105e2f932b
-
SHA1
866eba0eedbbbd0476a91d62d6225fbf72d8ec5e
-
SHA256
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a
-
SHA512
186a727ff7df6a1f4b081363052e59715633c5f29821c0abd649045dc7c1f0a47e8bb78655b6d2d3d5aba7a133bd119a08a8ccbea5d90e27c08a690579dda268
-
SSDEEP
12288:8RkrHna1a8Lze25cuu0LD5WmpYshXZPbGwidNpgJ:8RkTa1ame2Fu0LD5WmD9idNpW
Behavioral task
behavioral1
Sample
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
consider-sa.gl.at.ply.gg:7609
Targets
-
-
Target
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a.bin
-
Size
760KB
-
MD5
a86c7da0387b37d3dff94c105e2f932b
-
SHA1
866eba0eedbbbd0476a91d62d6225fbf72d8ec5e
-
SHA256
efc720e365156c872d825979cf4fe869b31d121d0514075185ec168c9900925a
-
SHA512
186a727ff7df6a1f4b081363052e59715633c5f29821c0abd649045dc7c1f0a47e8bb78655b6d2d3d5aba7a133bd119a08a8ccbea5d90e27c08a690579dda268
-
SSDEEP
12288:8RkrHna1a8Lze25cuu0LD5WmpYshXZPbGwidNpgJ:8RkTa1ame2Fu0LD5WmD9idNpW
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-