General
-
Target
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94.bin
-
Size
760KB
-
Sample
241208-1zejeavmey
-
MD5
3b7b629d3859f20465dda2b6853488d9
-
SHA1
edffdcfd44d611cac367161ab1e41d0dace13ee0
-
SHA256
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94
-
SHA512
f42000c42340ead6002c6a19a40beaff17fb062b73f315e1e4ba3ea8c7be0a3b1f020b86c7c0734cb12a0c2aaa3c6fa5ee1d134f6674e657bb00eba845a12c92
-
SSDEEP
12288:0WbzPa1a8LzeqnEH4bhd5WmpYshXZPbGwidNpgN:0WPa1ameqK4bhd5WmD9idNp6
Behavioral task
behavioral1
Sample
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
24.ip.gl.ply.gg:22375
Targets
-
-
Target
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94.bin
-
Size
760KB
-
MD5
3b7b629d3859f20465dda2b6853488d9
-
SHA1
edffdcfd44d611cac367161ab1e41d0dace13ee0
-
SHA256
6dc63508d8efe1f348e38d168a46b4823af187e1c4aee5975208ade91b25ad94
-
SHA512
f42000c42340ead6002c6a19a40beaff17fb062b73f315e1e4ba3ea8c7be0a3b1f020b86c7c0734cb12a0c2aaa3c6fa5ee1d134f6674e657bb00eba845a12c92
-
SSDEEP
12288:0WbzPa1a8LzeqnEH4bhd5WmpYshXZPbGwidNpgN:0WPa1ameqK4bhd5WmD9idNp6
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-