General
-
Target
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.bin
-
Size
1.2MB
-
Sample
241204-12vcmstnaz
-
MD5
f9e80cbe1b4b7bae80fa1149b8825f61
-
SHA1
22f6924c8105206d57d1b4c3c7d017f07ba4b20a
-
SHA256
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69
-
SHA512
8993925bb3b5533dcce53b3c3930abc5196219a960b763b8129edaaa74ba0ef904384825a9991e252c939315e4ae8987cd518d0f1edd9ddbff190675dd54d2b9
-
SSDEEP
24576:s3yw0ES+rG3mcHNA34qpa3UnVVxv4A1RyYYgJPdJ3FP6JoR1:s3yw0E5r2muaBpYUnN1RyYYgJP7EJs
Behavioral task
behavioral1
Sample
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
cy.alhaneny.com:1150
Targets
-
-
Target
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69.bin
-
Size
1.2MB
-
MD5
f9e80cbe1b4b7bae80fa1149b8825f61
-
SHA1
22f6924c8105206d57d1b4c3c7d017f07ba4b20a
-
SHA256
f67a269a89386ae8018d4b034700b9bfa9306655d850e4fd94760a483c259a69
-
SHA512
8993925bb3b5533dcce53b3c3930abc5196219a960b763b8129edaaa74ba0ef904384825a9991e252c939315e4ae8987cd518d0f1edd9ddbff190675dd54d2b9
-
SSDEEP
24576:s3yw0ES+rG3mcHNA34qpa3UnVVxv4A1RyYYgJPdJ3FP6JoR1:s3yw0E5r2muaBpYUnN1RyYYgJP7EJs
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Tries to add a device administrator.
-