General
-
Target
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.bin
-
Size
760KB
-
Sample
241109-25x4daxjhl
-
MD5
a394528ab3192dd6c2646a8c02c02c9c
-
SHA1
ccfcfec2860eeafdcda0b81933d93048aeaa4777
-
SHA256
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c
-
SHA512
39765a42d9d9eb45d39dffc4496542c3e0c4dab045243ea9ccea0a00a0023f812f56f98a3ffb53397949f5242d93c45d5a437b39d35fad9b1e73d706d90a317c
-
SSDEEP
12288:dWpqlgBZRvSMqHBToBQik5WmpYshXZPbGwidNpgk:dWp5BZRrqHeBQik5WmD9idNpf
Behavioral task
behavioral1
Sample
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
23.ip.gl.ply.gg:52111
Targets
-
-
Target
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c.bin
-
Size
760KB
-
MD5
a394528ab3192dd6c2646a8c02c02c9c
-
SHA1
ccfcfec2860eeafdcda0b81933d93048aeaa4777
-
SHA256
c643cf8e3eaf13f2e9dc401456fcd099a78aaf90f827856ac907bd046ef9a52c
-
SHA512
39765a42d9d9eb45d39dffc4496542c3e0c4dab045243ea9ccea0a00a0023f812f56f98a3ffb53397949f5242d93c45d5a437b39d35fad9b1e73d706d90a317c
-
SSDEEP
12288:dWpqlgBZRvSMqHBToBQik5WmpYshXZPbGwidNpgk:dWp5BZRrqHeBQik5WmD9idNpf
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-