General
-
Target
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.bin
-
Size
760KB
-
Sample
241218-1ytxpsvjfj
-
MD5
3a0672ee9a000648bd3865ecc80f4ed8
-
SHA1
ccd9f25b18fa4841970c7f6c5a3294d14ce80f9d
-
SHA256
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12
-
SHA512
21ff2d65c2e51257dac511f5286e77807d3ab963056b7ef893f9a8c0919f96eb9c9d0be93b5bb5c9703793d103cc581dc8734444e80e1b1a0fa1c35ff85fbae8
-
SSDEEP
12288:2Q1DTcdAa1a8LzeVhdknhom5WmpYshXZPbGwidNpgGx:2Q1OAa1ameVknhom5WmD9idNpH
Behavioral task
behavioral1
Sample
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
4.tcp.eu.ngrok.io:11200
Targets
-
-
Target
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12.bin
-
Size
760KB
-
MD5
3a0672ee9a000648bd3865ecc80f4ed8
-
SHA1
ccd9f25b18fa4841970c7f6c5a3294d14ce80f9d
-
SHA256
7e0f9060a14a35e1e7ef971548391a2b3f84db907e0ae5221f93b0fc58486f12
-
SHA512
21ff2d65c2e51257dac511f5286e77807d3ab963056b7ef893f9a8c0919f96eb9c9d0be93b5bb5c9703793d103cc581dc8734444e80e1b1a0fa1c35ff85fbae8
-
SSDEEP
12288:2Q1DTcdAa1a8LzeVhdknhom5WmpYshXZPbGwidNpgGx:2Q1OAa1ameVknhom5WmD9idNpH
Score7/10-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-