General
-
Target
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.bin
-
Size
758KB
-
Sample
241123-1yrscayngw
-
MD5
07c8fd6b64f7684358faac2e62c84d07
-
SHA1
4f206b9ed20ff698852750a96267e8a3ed77c56f
-
SHA256
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f
-
SHA512
48269e258a0ffea1f24835982f1dea6b031cf7a2a72971a73a696d2526d9cdc837e2c05e2146f13aca9f08f5e9eea8c207b018688bb434fa6a129ea6988c9c77
-
SSDEEP
12288:oJaBOa1a8Ldeg4Wr8R9IS5WmpYshXZPbGwidNpgwtB:Cha1a6egzr8R9IS5WmD9idNpBtB
Behavioral task
behavioral1
Sample
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
callrat-33839.portmap.host:33839
Targets
-
-
Target
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f.bin
-
Size
758KB
-
MD5
07c8fd6b64f7684358faac2e62c84d07
-
SHA1
4f206b9ed20ff698852750a96267e8a3ed77c56f
-
SHA256
7e0522de4dd7e372e06e8e650c95d53002d446dcc38dafc3c47d03e40857797f
-
SHA512
48269e258a0ffea1f24835982f1dea6b031cf7a2a72971a73a696d2526d9cdc837e2c05e2146f13aca9f08f5e9eea8c207b018688bb434fa6a129ea6988c9c77
-
SSDEEP
12288:oJaBOa1a8Ldeg4Wr8R9IS5WmpYshXZPbGwidNpgwtB:Cha1a6egzr8R9IS5WmD9idNpBtB
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-