General
-
Target
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485.bin
-
Size
770KB
-
Sample
241126-11m7yaskfw
-
MD5
70a55d84829510715105212032ce67d4
-
SHA1
be7bd9b891e53146425fb493e24534f69596ecd1
-
SHA256
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485
-
SHA512
79f950510e18ed93ac16f4d2d7ea2205590633d3c3af54f6997b172470534c18ef268e981f1cf4adc4ed4bfc3dcd9cd531cc5c45b132f70965079d9b8063c798
-
SSDEEP
12288:Q/ka1a8Lze2TEz4TbVz5WmpYshXZPbGwidNpga:Na1ame2TC4TbVz5WmD9idNpp
Behavioral task
behavioral1
Sample
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
192.168.10.3:2221
Targets
-
-
Target
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485.bin
-
Size
770KB
-
MD5
70a55d84829510715105212032ce67d4
-
SHA1
be7bd9b891e53146425fb493e24534f69596ecd1
-
SHA256
5317594a61f72a00ad948d32b98747c6cd8aeabf7c2755e9763c9803e0524485
-
SHA512
79f950510e18ed93ac16f4d2d7ea2205590633d3c3af54f6997b172470534c18ef268e981f1cf4adc4ed4bfc3dcd9cd531cc5c45b132f70965079d9b8063c798
-
SSDEEP
12288:Q/ka1a8Lze2TEz4TbVz5WmpYshXZPbGwidNpga:Na1ame2TC4TbVz5WmD9idNpp
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-