General
-
Target
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.bin
-
Size
850KB
-
Sample
241205-1xe26azqen
-
MD5
89e6675e6d17965936c3bd4a4905920b
-
SHA1
870ed68989ccee75682a15054f2d887388615c3e
-
SHA256
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506
-
SHA512
98e69cde3c47a3d93b61113095c0e4d9779bf9e9278def3366bf49a38068e533893cfb79386cacf4ec680e6b06a67c9470e5d0291cf59a0479fdaada6143e566
-
SSDEEP
24576:eda1amemzMbm06c/dHmVX05WmD9idNpg4:ua1aKzyj/VhWk0d/1
Behavioral task
behavioral1
Sample
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.apk
Resource
android-x64-20240910-en
Malware Config
Extracted
spynote
badr001.ddns.net:4444
Targets
-
-
Target
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506.bin
-
Size
850KB
-
MD5
89e6675e6d17965936c3bd4a4905920b
-
SHA1
870ed68989ccee75682a15054f2d887388615c3e
-
SHA256
a53cb898d590ea1b59aa0912c366a664c5c613b96a407511173e0590da285506
-
SHA512
98e69cde3c47a3d93b61113095c0e4d9779bf9e9278def3366bf49a38068e533893cfb79386cacf4ec680e6b06a67c9470e5d0291cf59a0479fdaada6143e566
-
SSDEEP
24576:eda1amemzMbm06c/dHmVX05WmD9idNpg4:ua1aKzyj/VhWk0d/1
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-