General
-
Target
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.bin
-
Size
760KB
-
Sample
241109-253zmatke1
-
MD5
7f21769f9964b8fc5844c3d49135a76f
-
SHA1
316a6f8a57b1bbac4b9a7c98132e536f5247aea0
-
SHA256
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940
-
SHA512
f26064720de467704829c9014cfb65351e8a6fa444f241bfac54e72d93717deb64f83be7d333364f84d7f3e2800186805c51b5658461da02dfabdebdc5c82650
-
SSDEEP
12288:jSeIY5da1a8Lre/pPf1EFm5WmpYshXZPbGwidNpg3:jLI8a1a2e/V1EFm5WmD9idNpE
Behavioral task
behavioral1
Sample
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
rohinmur123-47569.portmap.io:47569
Targets
-
-
Target
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940.bin
-
Size
760KB
-
MD5
7f21769f9964b8fc5844c3d49135a76f
-
SHA1
316a6f8a57b1bbac4b9a7c98132e536f5247aea0
-
SHA256
5eedd782c1b45854aa0141521fb32c39769b84faf276a4d39953197f33b03940
-
SHA512
f26064720de467704829c9014cfb65351e8a6fa444f241bfac54e72d93717deb64f83be7d333364f84d7f3e2800186805c51b5658461da02dfabdebdc5c82650
-
SSDEEP
12288:jSeIY5da1a8Lre/pPf1EFm5WmpYshXZPbGwidNpg3:jLI8a1a2e/V1EFm5WmD9idNpE
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-