General
-
Target
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.bin
-
Size
760KB
-
Sample
241229-1xhhaaxrgk
-
MD5
e5a5ca1d36f185e42529c732e99225a1
-
SHA1
1ee5ae53d36c7143d734d31425a63873905092b7
-
SHA256
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494
-
SHA512
8d9628459746321f570e067efd2991290fccd9309eea52e1be0f4a20535ee1eebda17e93cb1314dd466061a46ba1ca74162c705cf59426e2e9820c299cd122c6
-
SSDEEP
12288:KL+htS3ca1a8LVeQMq3igXc5WmpYshXZPbGwidNpgK:KLPsa1aKeQTigXc5WmD9idNpV
Behavioral task
behavioral1
Sample
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
deda-178-90-26-163.ngrok-free.app:8080
Targets
-
-
Target
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494.bin
-
Size
760KB
-
MD5
e5a5ca1d36f185e42529c732e99225a1
-
SHA1
1ee5ae53d36c7143d734d31425a63873905092b7
-
SHA256
4e5369679b81bb85214f7bcc85511e069e87546aff1f6f1ff89becee21326494
-
SHA512
8d9628459746321f570e067efd2991290fccd9309eea52e1be0f4a20535ee1eebda17e93cb1314dd466061a46ba1ca74162c705cf59426e2e9820c299cd122c6
-
SSDEEP
12288:KL+htS3ca1a8LVeQMq3igXc5WmpYshXZPbGwidNpgK:KLPsa1aKeQTigXc5WmD9idNpV
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-