General
-
Target
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.bin
-
Size
760KB
-
Sample
241217-122fyszlhw
-
MD5
e0a438105214931e5eaa867540ab2d14
-
SHA1
e9a2f8a174cfc6b041569e652605633b9ac817ce
-
SHA256
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4
-
SHA512
b71b308e1186dffffe232a8c0529448bbc4265948ecf2a972f98bb763a71fdbad7377cdfd0274406ce512f870f5168cd7fa844e3bec868bdfb538e3ed08e9191
-
SSDEEP
12288:ZWOwoBZRvSMqrz/XXv7aoq5WmpYshXZPbGwidNpgYd:ZzBZRrqrLXzaoq5WmD9idNpjd
Behavioral task
behavioral1
Sample
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
server-adding.gl.at.ply.gg:1755
Targets
-
-
Target
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4.bin
-
Size
760KB
-
MD5
e0a438105214931e5eaa867540ab2d14
-
SHA1
e9a2f8a174cfc6b041569e652605633b9ac817ce
-
SHA256
ba8b22fbc74a31aeea945dd6db71a069ea78026ea4dbf9639cd1d292c7e0cef4
-
SHA512
b71b308e1186dffffe232a8c0529448bbc4265948ecf2a972f98bb763a71fdbad7377cdfd0274406ce512f870f5168cd7fa844e3bec868bdfb538e3ed08e9191
-
SSDEEP
12288:ZWOwoBZRvSMqrz/XXv7aoq5WmpYshXZPbGwidNpgYd:ZzBZRrqrLXzaoq5WmD9idNpjd
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-