General
-
Target
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.bin
-
Size
787KB
-
Sample
241117-13w8mazarf
-
MD5
be2033de8cfe17f674187963c64569d5
-
SHA1
436026fa8c25ae0dbefd1d97c34bb94f5aa42526
-
SHA256
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f
-
SHA512
66f3f2689064ba0f0ac608f4cbb6394260045a982240cc6aeccc3e3f4e320f7cc942551bb5d14c8696c682d0e5243d9d914adfff43a1ae51b0994bcd4fbcb995
-
SSDEEP
12288:AaO+dUa1a8LzehNXkZ2Nufy75WmpYshXZPbGwidNpgn:2IUa1amehN0Z2NEy75WmD9idNpE
Behavioral task
behavioral1
Sample
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
bgjkafw.localto.net:8464
Targets
-
-
Target
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f.bin
-
Size
787KB
-
MD5
be2033de8cfe17f674187963c64569d5
-
SHA1
436026fa8c25ae0dbefd1d97c34bb94f5aa42526
-
SHA256
92f9a10445923119876c8f227b4509797edddf4a27e596ebc0c24ec14ee5635f
-
SHA512
66f3f2689064ba0f0ac608f4cbb6394260045a982240cc6aeccc3e3f4e320f7cc942551bb5d14c8696c682d0e5243d9d914adfff43a1ae51b0994bcd4fbcb995
-
SSDEEP
12288:AaO+dUa1a8LzehNXkZ2Nufy75WmpYshXZPbGwidNpgn:2IUa1amehN0Z2NEy75WmD9idNpE
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-