General
-
Target
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.bin
-
Size
792KB
-
Sample
241229-1xxxzaxrhq
-
MD5
933ed9c10630b5404cac69d59499fb4d
-
SHA1
314bfeacc2948c03efce670bef14e513fee53880
-
SHA256
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640
-
SHA512
82ecc6ab00e19e56b27560bc7697cbc7e86fe41b4a895e44ca6de5329ccee519e4efb97ecab74b5521dce394cd830dcbcf164fdd8396914a942acb1327b0cc64
-
SSDEEP
12288:8Qta1a8LzejFKxthS15WmpYshXZPbGwidNpgl:84a1amejcxvS15WmD9idNpW
Behavioral task
behavioral1
Sample
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
7.tcp.eu.ngrok.io:16642
Targets
-
-
Target
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640.bin
-
Size
792KB
-
MD5
933ed9c10630b5404cac69d59499fb4d
-
SHA1
314bfeacc2948c03efce670bef14e513fee53880
-
SHA256
a930e52113bd021be7fcde4129f1e0a2198d0e30eae75bab24c774c99888c640
-
SHA512
82ecc6ab00e19e56b27560bc7697cbc7e86fe41b4a895e44ca6de5329ccee519e4efb97ecab74b5521dce394cd830dcbcf164fdd8396914a942acb1327b0cc64
-
SSDEEP
12288:8Qta1a8LzejFKxthS15WmpYshXZPbGwidNpgl:84a1amejcxvS15WmD9idNpW
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-