General
-
Target
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.bin
-
Size
747KB
-
Sample
241231-1yjrqstqcm
-
MD5
2930e61d83cedefb9bbc193740887ca3
-
SHA1
5bcf31b35feedf3f3ec148e87117243f9424f030
-
SHA256
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94
-
SHA512
d4d2cec95f2e0cb6e5cd5fa4127e0af0ae3a1f0a82a1a34dd92263bd5ae393e483112332d3e49eed927f44ebdb7421c8745c1f6d30d23bfd0e1a624a33a55ffe
-
SSDEEP
12288:8+a1a8LzeJQQRDf95WmpYshXZPbGwidNpgKU:ja1ameJJRDf95WmD9idNp5U
Behavioral task
behavioral1
Sample
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
break-lounge.gl.at.ply.gg:47852
Targets
-
-
Target
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94.bin
-
Size
747KB
-
MD5
2930e61d83cedefb9bbc193740887ca3
-
SHA1
5bcf31b35feedf3f3ec148e87117243f9424f030
-
SHA256
b4f889b6ae4078cb9a21a2d1b2e317853260bb3b66b0abaf651d0b481933ee94
-
SHA512
d4d2cec95f2e0cb6e5cd5fa4127e0af0ae3a1f0a82a1a34dd92263bd5ae393e483112332d3e49eed927f44ebdb7421c8745c1f6d30d23bfd0e1a624a33a55ffe
-
SSDEEP
12288:8+a1a8LzeJQQRDf95WmpYshXZPbGwidNpgKU:ja1ameJJRDf95WmD9idNp5U
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-