General
-
Target
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.bin
-
Size
760KB
-
Sample
241204-11ewkatmcz
-
MD5
5c5051e7a41b50b71f408bb66564c93b
-
SHA1
83490bd50a6035272bd54de417537c05ae06949c
-
SHA256
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a
-
SHA512
da1328abab00e97d273bfb6fdf016018a05c9f27cdc3cb76277719b2ad3d6fc1fbf18a84a354921cb4fe93974b37dcfd55db4b1a179d280ed6007447b6c3fe61
-
SSDEEP
12288:Ap5232a1a8LVeCJEe6VxDL5WmpYshXZPbGwidNpgp:Apha1aKeCB6/DL5WmD9idNpi
Behavioral task
behavioral1
Sample
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
22.ip.gl.ply.gg:31255
Targets
-
-
Target
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a.bin
-
Size
760KB
-
MD5
5c5051e7a41b50b71f408bb66564c93b
-
SHA1
83490bd50a6035272bd54de417537c05ae06949c
-
SHA256
de235cef5f56a18e370c994e9ab609bdf9ed979e4f705a3434aa1a3e9592c39a
-
SHA512
da1328abab00e97d273bfb6fdf016018a05c9f27cdc3cb76277719b2ad3d6fc1fbf18a84a354921cb4fe93974b37dcfd55db4b1a179d280ed6007447b6c3fe61
-
SSDEEP
12288:Ap5232a1a8LVeCJEe6VxDL5WmpYshXZPbGwidNpgp:Apha1aKeCB6/DL5WmD9idNpi
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-