General
-
Target
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.bin
-
Size
760KB
-
Sample
241209-1w72jssqft
-
MD5
9b186aa2c7d60a63bf25b7ff0f5bf6d4
-
SHA1
4844c4c0051270e6a6cb651b7105defe3c84e007
-
SHA256
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539
-
SHA512
2b3f0ecebdf4a65747337465dbb73d22ff745e4ea9003232396920c4088c7ee311663a4bf0f76e990b311de6330615951c8b13342916360eb241b564db24f60d
-
SSDEEP
12288:ZaQa1a8LzeKhomqzzX5WmpYshXZPbGwidNpgX:ta1ameKdqzzX5WmD9idNpk
Behavioral task
behavioral1
Sample
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
10.8.70.118:4586
Targets
-
-
Target
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539.bin
-
Size
760KB
-
MD5
9b186aa2c7d60a63bf25b7ff0f5bf6d4
-
SHA1
4844c4c0051270e6a6cb651b7105defe3c84e007
-
SHA256
3bb3fa66498ed7d18791845bfe9dddca346cb2012b9f840f18413cf4e8143539
-
SHA512
2b3f0ecebdf4a65747337465dbb73d22ff745e4ea9003232396920c4088c7ee311663a4bf0f76e990b311de6330615951c8b13342916360eb241b564db24f60d
-
SSDEEP
12288:ZaQa1a8LzeKhomqzzX5WmpYshXZPbGwidNpgX:ta1ameKdqzzX5WmD9idNpk
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-