General
-
Target
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c.bin
-
Size
773KB
-
Sample
241229-11b5nsyjct
-
MD5
c87ba3d7c44a4d02b75e50803c458632
-
SHA1
467a956ff845c023c6a7118ce91ac8c7bd80d861
-
SHA256
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c
-
SHA512
f1b42cd2d3ef58636a50f43cca32da76b07069ba2454920080b68002df34315a68fc06e3ee8e981c20d6978fdfe30fe4a844da89da944664500d2610cbf2c59b
-
SSDEEP
12288:rFObJ6sgRALz5Keh59ZeZ5WmpYshXZPbGwidNpg88:8J6s7Lz5KG9ZeZ5WmD9idNpY
Behavioral task
behavioral1
Sample
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
38.240.32.18:1605
Targets
-
-
Target
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c.bin
-
Size
773KB
-
MD5
c87ba3d7c44a4d02b75e50803c458632
-
SHA1
467a956ff845c023c6a7118ce91ac8c7bd80d861
-
SHA256
2a4855fd9c75ee8acf02f6e85dc34600191c34c5a2540cab48a726e42836100c
-
SHA512
f1b42cd2d3ef58636a50f43cca32da76b07069ba2454920080b68002df34315a68fc06e3ee8e981c20d6978fdfe30fe4a844da89da944664500d2610cbf2c59b
-
SSDEEP
12288:rFObJ6sgRALz5Keh59ZeZ5WmpYshXZPbGwidNpg88:8J6s7Lz5KG9ZeZ5WmD9idNpY
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-