General
-
Target
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.bin
-
Size
760KB
-
Sample
241219-1x3hfs1lc1
-
MD5
fcf5431a0a9a07d39dc82c6f76b95f60
-
SHA1
efada35a1b8bc2f53b4062bef5ddef3d5d41b2b4
-
SHA256
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a
-
SHA512
358d876a0908ecc5cd66208f6a36e32dae2e1e6662c307a61cbb415f0c12796cf2b51bff4868b55d1aaf6f1e6b22dec78fdb5b375f2577076993894ab60194cf
-
SSDEEP
12288:WEzuVxa1a8LdeANG4wYld5WmpYshXZPbGwidNpgsG+:WE8a1a6eARwYld5WmD9idNpZ
Behavioral task
behavioral1
Sample
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
list-return.gl.at.ply.gg:43911
Targets
-
-
Target
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a.bin
-
Size
760KB
-
MD5
fcf5431a0a9a07d39dc82c6f76b95f60
-
SHA1
efada35a1b8bc2f53b4062bef5ddef3d5d41b2b4
-
SHA256
721cf4a029204167c7bd25b45ed826ac072a842c781a0a9997a55815c4a53f9a
-
SHA512
358d876a0908ecc5cd66208f6a36e32dae2e1e6662c307a61cbb415f0c12796cf2b51bff4868b55d1aaf6f1e6b22dec78fdb5b375f2577076993894ab60194cf
-
SSDEEP
12288:WEzuVxa1a8LdeANG4wYld5WmpYshXZPbGwidNpgsG+:WE8a1a6eARwYld5WmD9idNpZ
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-