General
-
Target
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.bin
-
Size
792KB
-
Sample
241230-1y5zza1kem
-
MD5
030313fb11b9d2882933cb808f629d4f
-
SHA1
82c3fa3e15aab34c068c241bdb41c9b3bf8f205f
-
SHA256
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e
-
SHA512
b510d7b0b599cd6ebc8e0980437d02a6e34e47b59096240da76a69ecdd0271139a7c7ca7e416166959886d3874fe84c0a9d9d0fcfacae9df257a3433d2180323
-
SSDEEP
12288:oOCkia1a8LVeUKO+narZ45WmpYshXZPbGwidNpgje:Mza1aKeUJ+arZ45WmD9idNpMe
Behavioral task
behavioral1
Sample
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
break-lounge.gl.at.ply.gg:47852
Targets
-
-
Target
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e.bin
-
Size
792KB
-
MD5
030313fb11b9d2882933cb808f629d4f
-
SHA1
82c3fa3e15aab34c068c241bdb41c9b3bf8f205f
-
SHA256
19fb1fd0ed73a526f96382a371858bb686e6e182665c76dc513092bd90994d0e
-
SHA512
b510d7b0b599cd6ebc8e0980437d02a6e34e47b59096240da76a69ecdd0271139a7c7ca7e416166959886d3874fe84c0a9d9d0fcfacae9df257a3433d2180323
-
SSDEEP
12288:oOCkia1a8LVeUKO+narZ45WmpYshXZPbGwidNpgje:Mza1aKeUJ+arZ45WmD9idNpMe
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-