General
-
Target
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df.bin
-
Size
787KB
-
Sample
241113-116dhstmdp
-
MD5
ac2d95af322130f8f9aa9e60b6c40ac4
-
SHA1
37c3deee6c7c0e9633180d3c62f29673d67a176a
-
SHA256
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df
-
SHA512
f31f96deddc284d9059c5f7479695ae9cbc839dc87c11a650cf971cbb6145aefb26fddb590a9de846426003aa707b91d51510911761bd82ab323a0aa21eab5c5
-
SSDEEP
12288:5kpwa1a8Lze878FqVNuGX85WmpYshXZPbGwidNpgO:Cpwa1ame874qVNZX85WmD9idNpJ
Behavioral task
behavioral1
Sample
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
xgsgf75.localto.net:3565
Targets
-
-
Target
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df.bin
-
Size
787KB
-
MD5
ac2d95af322130f8f9aa9e60b6c40ac4
-
SHA1
37c3deee6c7c0e9633180d3c62f29673d67a176a
-
SHA256
fb87e7cecd44215b05c2e26a1ecf803ca23c53e899d87f2f0ed0b3827d3862df
-
SHA512
f31f96deddc284d9059c5f7479695ae9cbc839dc87c11a650cf971cbb6145aefb26fddb590a9de846426003aa707b91d51510911761bd82ab323a0aa21eab5c5
-
SSDEEP
12288:5kpwa1a8Lze878FqVNuGX85WmpYshXZPbGwidNpgO:Cpwa1ame874qVNZX85WmD9idNpJ
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-