General
-
Target
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8.bin
-
Size
760KB
-
Sample
241208-1zcd2svmew
-
MD5
789b1d7b282c07227bfad8d202732c34
-
SHA1
c094ad586579409da7c2721fbe3ac6504380ea37
-
SHA256
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8
-
SHA512
2dfbb0695ef517142edc68f020b9324150804031de40fed53f273904b460fcb37ebf9cec5334b35e1ea323a5b4fa0422be02728a1c438256af17524ac8161843
-
SSDEEP
12288:qv+iTlZuca1a8LVek9ysEOJR5WmpYshXZPbGwidNpgoE:qv+Ora1aKekZEOJR5WmD9idNpq
Behavioral task
behavioral1
Sample
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
24.ip.gl.ply.gg:22375
Targets
-
-
Target
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8.bin
-
Size
760KB
-
MD5
789b1d7b282c07227bfad8d202732c34
-
SHA1
c094ad586579409da7c2721fbe3ac6504380ea37
-
SHA256
2a502ca364a8329c1d78901f7a0da7e1d59064fe4cd859b97eaefb4199c6f4c8
-
SHA512
2dfbb0695ef517142edc68f020b9324150804031de40fed53f273904b460fcb37ebf9cec5334b35e1ea323a5b4fa0422be02728a1c438256af17524ac8161843
-
SSDEEP
12288:qv+iTlZuca1a8LVek9ysEOJR5WmpYshXZPbGwidNpgoE:qv+Ora1aKekZEOJR5WmD9idNpq
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-