General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/apszglcaz7fkezf/Head$Trick++Paid.apk/file
Resource
android-x64-arm64-20240624-es
android-11-x64
9 signatures
600 seconds
Malware Config
Targets
-
-
Target
https://www.mediafire.com/file/apszglcaz7fkezf/Head$Trick++Paid.apk/file
Score10/10-
Spynote family
-
Spynote payload
-
Attempts to obfuscate APK file format
Applies obfuscation techniques to the APK format in order to hinder analysis
-
Declares broadcast receivers with permission to handle system events
-
Declares services with permission to bind to the system
-
Requests dangerous framework permissions
-