General
-
Target
client.apk
-
Size
754KB
-
Sample
241221-paf56ayqgx
-
MD5
7aa2c84bbdf3a83ccc1b8c5fa13ee997
-
SHA1
9fbdd98f2998021d8a496ae9e088a0bb9f277fe6
-
SHA256
dad2596f9077bc14e41d81efbf016dc103b31094ae57200a36ee03ee1dd076a6
-
SHA512
448e321ac49c9604c5aa18f7d07ab3ff68e6d3d205d4046ea968cbe9383034def40ae51a4b7c666d8a975fcc3a558a54b868ef56302cfe256a8ba4359a776f76
-
SSDEEP
12288:R2fo8/BfvNldjdwNh1j8oSSoEQWPvdVDqFntOS37L:QfoAfvNTd8Xj8oSSoEBvdJCp37L
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
spynote
science-attract.gl.at.ply.gg:13548
Targets
-
-
Target
client.apk
-
Size
754KB
-
MD5
7aa2c84bbdf3a83ccc1b8c5fa13ee997
-
SHA1
9fbdd98f2998021d8a496ae9e088a0bb9f277fe6
-
SHA256
dad2596f9077bc14e41d81efbf016dc103b31094ae57200a36ee03ee1dd076a6
-
SHA512
448e321ac49c9604c5aa18f7d07ab3ff68e6d3d205d4046ea968cbe9383034def40ae51a4b7c666d8a975fcc3a558a54b868ef56302cfe256a8ba4359a776f76
-
SSDEEP
12288:R2fo8/BfvNldjdwNh1j8oSSoEQWPvdVDqFntOS37L:QfoAfvNTd8Xj8oSSoEBvdJCp37L
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-