General
-
Target
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26.bin
-
Size
792KB
-
Sample
241230-1xe26atlfv
-
MD5
04cc32d251cbcd8a5ea9e723fc6e2244
-
SHA1
ea01fe972c5c0f4d76f232f29d3917d12f7f5682
-
SHA256
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26
-
SHA512
6cfc886e883688d539f9e0dac84e586e8985eef9fce31eb765c3f802a99db8b280c9dd102269f387a6a6294aaf467331d8b113fda84353838f6201f3113549c3
-
SSDEEP
12288:lYJ6C+a1a8LVeCm5mo4f6R5WmpYshXZPbGwidNpgTF:l7za1aKeCamlf6R5WmD9idNpYF
Behavioral task
behavioral1
Sample
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
break-lounge.gl.at.ply.gg:47852
Targets
-
-
Target
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26.bin
-
Size
792KB
-
MD5
04cc32d251cbcd8a5ea9e723fc6e2244
-
SHA1
ea01fe972c5c0f4d76f232f29d3917d12f7f5682
-
SHA256
e0cab4489a9856e65475c16cb6b1896337e5ff19d9197ebc0246b671912a3b26
-
SHA512
6cfc886e883688d539f9e0dac84e586e8985eef9fce31eb765c3f802a99db8b280c9dd102269f387a6a6294aaf467331d8b113fda84353838f6201f3113549c3
-
SSDEEP
12288:lYJ6C+a1a8LVeCm5mo4f6R5WmpYshXZPbGwidNpgTF:l7za1aKeCamlf6R5WmD9idNpYF
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-