General
-
Target
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256.bin
-
Size
760KB
-
Sample
241221-13hega1pgk
-
MD5
8e047c50713ed4e3c346fb4a9a0014e6
-
SHA1
5e2cfaf10477b16a3f74165be5c08893ed7490f5
-
SHA256
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256
-
SHA512
6ab79541f239ee592014a94f212d6bb6cc596edfd9ebc124489ec411fe62225cd3b7c0a8ca2af11cbdea669138ecb63898ce4aa69cd64d3a4729da77fdea4deb
-
SSDEEP
12288:cst7Tva1a8LVeqR06qEXL5WmpYshXZPbGwidNpgo:cst/a1aKeqhqEXL5WmD9idNpD
Behavioral task
behavioral1
Sample
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
d-controversy.gl.at.ply.gg:39204
Targets
-
-
Target
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256.bin
-
Size
760KB
-
MD5
8e047c50713ed4e3c346fb4a9a0014e6
-
SHA1
5e2cfaf10477b16a3f74165be5c08893ed7490f5
-
SHA256
b5190fd9597da32f364f01980ebe77815e812d76907ea6bdc42e8f5a6b2f0256
-
SHA512
6ab79541f239ee592014a94f212d6bb6cc596edfd9ebc124489ec411fe62225cd3b7c0a8ca2af11cbdea669138ecb63898ce4aa69cd64d3a4729da77fdea4deb
-
SSDEEP
12288:cst7Tva1a8LVeqR06qEXL5WmpYshXZPbGwidNpgo:cst/a1aKeqhqEXL5WmD9idNpD
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-