General
-
Target
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f.bin
-
Size
760KB
-
Sample
241229-1xjqcaxrgm
-
MD5
d12dedaaf3abbec5006009f524a75be0
-
SHA1
b878b25b5f0b1174b07c35001fca2512758ee3de
-
SHA256
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f
-
SHA512
4ef677329caf712be03faf944bb8b97a4bd422fda7e06cca32c2c9410a594ec4b9372f5787063912796961a1dc4f55c2cafc42ca59b5a3e334f8396dc8a4715b
-
SSDEEP
12288:GaTRHua1a8LVer1yma/uP55WmpYshXZPbGwidNpgnF:Gxa1aKervmuP55WmD9idNpC
Behavioral task
behavioral1
Sample
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
ad-forestry.gl.at.ply.gg:51714
Targets
-
-
Target
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f.bin
-
Size
760KB
-
MD5
d12dedaaf3abbec5006009f524a75be0
-
SHA1
b878b25b5f0b1174b07c35001fca2512758ee3de
-
SHA256
10946179b46182d1024c6e8479b398c60b827812ca7b71f998b0e6ea47ba689f
-
SHA512
4ef677329caf712be03faf944bb8b97a4bd422fda7e06cca32c2c9410a594ec4b9372f5787063912796961a1dc4f55c2cafc42ca59b5a3e334f8396dc8a4715b
-
SSDEEP
12288:GaTRHua1a8LVer1yma/uP55WmpYshXZPbGwidNpgnF:Gxa1aKervmuP55WmD9idNpC
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-