General
-
Target
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.bin
-
Size
760KB
-
Sample
250101-1w1x8swqes
-
MD5
6e4a08d8ed87d579e7324ff5b3efdbd3
-
SHA1
cdd318b379bb2d76c86d92535ea3bc48b4161eb8
-
SHA256
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a
-
SHA512
1d754567914ba39b7280d68fa55dfc94cfdd41fd9d65eb46a9c9115c17d831bdd2a377c8528ab18dcb3bca7b943b069411216d50ce5e2d2919f402ee57d9be49
-
SSDEEP
12288:6rBz2mfJ6sgRQLzW6wO8par5WmpYshXZPbGwidNpglM:6FztJ6sjLzWe8par5WmD9idNpp
Behavioral task
behavioral1
Sample
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
en-organisations.gl.at.ply.gg:56409
Targets
-
-
Target
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a.bin
-
Size
760KB
-
MD5
6e4a08d8ed87d579e7324ff5b3efdbd3
-
SHA1
cdd318b379bb2d76c86d92535ea3bc48b4161eb8
-
SHA256
ec4e76453ac24f37fd037e1cf0d63d2f4987fc8dddb8e35131e9661ec0048a3a
-
SHA512
1d754567914ba39b7280d68fa55dfc94cfdd41fd9d65eb46a9c9115c17d831bdd2a377c8528ab18dcb3bca7b943b069411216d50ce5e2d2919f402ee57d9be49
-
SSDEEP
12288:6rBz2mfJ6sgRQLzW6wO8par5WmpYshXZPbGwidNpglM:6FztJ6sjLzWe8par5WmD9idNpp
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-