General
-
Target
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.bin
-
Size
760KB
-
Sample
241229-1yq6taxrex
-
MD5
e2c769c36983395783edbd3d0e49d020
-
SHA1
562f4a3dfa4e74e06be320c4ad37ad1ceb21af20
-
SHA256
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1
-
SHA512
43e37883486f8633f01fc2bf9a436fb148f4de4bac292f01abba2cb83c9f7db4402f700928bd05c52535ed4b5e3328dcfae4ad8a68578333bba0b87e854ecf26
-
SSDEEP
12288:wugitv3BZRvS0qFWNGbmYt5WmpYshXZPbGwidNpgB:wFiRBZRrqFZbmYt5WmD9idNpu
Behavioral task
behavioral1
Sample
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
key-graphics.gl.at.ply.gg:47041
Targets
-
-
Target
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1.bin
-
Size
760KB
-
MD5
e2c769c36983395783edbd3d0e49d020
-
SHA1
562f4a3dfa4e74e06be320c4ad37ad1ceb21af20
-
SHA256
087a29f6aa117e87ab9b7ab00412efc69c26d316e24589716dddcd156a7f2cb1
-
SHA512
43e37883486f8633f01fc2bf9a436fb148f4de4bac292f01abba2cb83c9f7db4402f700928bd05c52535ed4b5e3328dcfae4ad8a68578333bba0b87e854ecf26
-
SSDEEP
12288:wugitv3BZRvS0qFWNGbmYt5WmpYshXZPbGwidNpgB:wFiRBZRrqFZbmYt5WmD9idNpu
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-