General
-
Target
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73.bin
-
Size
562KB
-
Sample
241208-1zbgrazldk
-
MD5
1d24e1514664bcf27a09d5b75c6297e3
-
SHA1
538eeeb519fdb8c5c00b1195eee739c94603ddee
-
SHA256
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73
-
SHA512
1300bda315842150b15291dd5ca8ab7383b1e774db428b2515e1c19413175d7f55fe092d48b4979270bdf933ee28c7d6693fac74c671fa70805b3002a1221f39
-
SSDEEP
12288:0zixEY6MPrsg8S6W8+tufu9ubWZlxi2odwvi/RwncvOi:0exAG9v6kum9ubsPgw6ucvd
Behavioral task
behavioral1
Sample
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
24.ip.gl.ply.gg:22375
Targets
-
-
Target
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73.bin
-
Size
562KB
-
MD5
1d24e1514664bcf27a09d5b75c6297e3
-
SHA1
538eeeb519fdb8c5c00b1195eee739c94603ddee
-
SHA256
2bae1ccc046dd4d0149ee35adb04870ec6019069087f82b9e2fab5dd0d741a73
-
SHA512
1300bda315842150b15291dd5ca8ab7383b1e774db428b2515e1c19413175d7f55fe092d48b4979270bdf933ee28c7d6693fac74c671fa70805b3002a1221f39
-
SSDEEP
12288:0zixEY6MPrsg8S6W8+tufu9ubWZlxi2odwvi/RwncvOi:0exAG9v6kum9ubsPgw6ucvd
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-