General
-
Target
20145891698.zip
-
Size
5.3MB
-
Sample
241203-p5386s1qel
-
MD5
8c5896bf736a69d76f0cf756c79d2233
-
SHA1
e6507976d3d3512b4203387ed9cb292a7161ec37
-
SHA256
ea7b0feda556abd530a52fee4efef53ebcc0cb5beec358bf4d8a3ecd3d002036
-
SHA512
0aa652694c402d8a600db4246b5108f113cbb8703710f86889d7f39320091eaedb9643432bcc8b0d23757cddbc5fc2039d375521b5a081b2e4a7b71c6395a498
-
SSDEEP
98304:e5ExV4W3FQ7OVCcU6v1vg3fc8/0DmVb7G+IgxZaBcbK6J2dzta6NeZZeQi1ZptW5:aExV4PgCh6v14cwzJyLgxZaB0K6JsZJ0
Behavioral task
behavioral1
Sample
96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618.apk
Resource
android-x64-arm64-20240624-es
Behavioral task
behavioral2
Sample
96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618.apk
Resource
android-33-x64-arm64-20240624-es
Malware Config
Extracted
spynote
1.tcp.ngrok.io:26423
Targets
-
-
Target
96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618
-
Size
5.3MB
-
MD5
39bdbdf74aa19384e2188763162096b0
-
SHA1
baffba739efa0f36b820445a20dfaccc9e3ac4f9
-
SHA256
96c00e172d4052285950f64a329efb32365fc3e93b5535a84ddfcc715aff5618
-
SHA512
9170a7f2aa4b57e1d0795c7e8caacb34e03fb08817c6f8e0ca547f2dc93991ccc94bb07f68c28bf63a33d10ae9bbc50776fece66b646edf1ce3538254f99c49c
-
SSDEEP
98304:/LI2MRcJI0G58SuyXdYaTHf/Yuezen31F2GcXKfZOyXCf8PdvQ:/LqRw/G2stHTHf/ezqz2GcXHyXWAQ
Score10/10-
Spynote family
-
Spynote payload
-
Declares broadcast receivers with permission to handle system events
-
Declares services with permission to bind to the system
-
Legitimate hosting services abused for malware hosting/C2
-
Requests dangerous framework permissions
-
Requests enabling of the accessibility settings.
-