General
-
Target
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.bin
-
Size
1.2MB
-
Sample
241113-1wslvszfpa
-
MD5
bb754b8b1592e337d2d56c896ee36649
-
SHA1
30d499a73d747a43f2e041ff5480561f194f2489
-
SHA256
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6
-
SHA512
a599a63761daf2299c4b1135b16d666a413674b7377880514a42cae7e45ed50258d24bd6da7a14901668706414342a4f5770764f5cb7607c9204c542b7df360a
-
SSDEEP
24576:zecIa1amefBUMsngXgsnnq8gCsYPeXt4aQ5WmD9idNph:/Ia1aJsngTq8l1Pe9GWk0d/h
Behavioral task
behavioral1
Sample
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
192.168.56.1:9595
Targets
-
-
Target
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6.bin
-
Size
1.2MB
-
MD5
bb754b8b1592e337d2d56c896ee36649
-
SHA1
30d499a73d747a43f2e041ff5480561f194f2489
-
SHA256
93d05214ad06cea7e5080a0a9bfc1abe81d95b78d58638bca47f473920b42fd6
-
SHA512
a599a63761daf2299c4b1135b16d666a413674b7377880514a42cae7e45ed50258d24bd6da7a14901668706414342a4f5770764f5cb7607c9204c542b7df360a
-
SSDEEP
24576:zecIa1amefBUMsngXgsnnq8gCsYPeXt4aQ5WmD9idNph:/Ia1aJsngTq8l1Pe9GWk0d/h
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-