General
-
Target
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1.bin
-
Size
760KB
-
Sample
241110-1xfzfswgqc
-
MD5
6476ce990c2017fb8b21f04f5630fb29
-
SHA1
e0a48c8593c481d8d92b4889ee50f35fca0281ab
-
SHA256
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1
-
SHA512
4d9f9d6a9ce5972176de1b04b064025d8683b5ea1153648940629d2829807a933a2ad8d630408bb642e4bfda457626c53be07874aa7e53b348ca70a7018f8004
-
SSDEEP
12288:/A636I4BZRvS0qsFnySrzB5WmpYshXZPbGwidNpgV:/A632BZRrqscSrzB5WmD9idNp+
Behavioral task
behavioral1
Sample
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
23.gl.at.ply.gg:5112
Targets
-
-
Target
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1.bin
-
Size
760KB
-
MD5
6476ce990c2017fb8b21f04f5630fb29
-
SHA1
e0a48c8593c481d8d92b4889ee50f35fca0281ab
-
SHA256
d7092caf2f1b9ef216623b108c26ecb23db1650705ac45a756e81874a8c668e1
-
SHA512
4d9f9d6a9ce5972176de1b04b064025d8683b5ea1153648940629d2829807a933a2ad8d630408bb642e4bfda457626c53be07874aa7e53b348ca70a7018f8004
-
SSDEEP
12288:/A636I4BZRvS0qsFnySrzB5WmpYshXZPbGwidNpgV:/A632BZRrqscSrzB5WmD9idNp+
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-