General
-
Target
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.bin
-
Size
747KB
-
Sample
250101-1wnb5swqcs
-
MD5
318093394469728fff0967b83b37e03a
-
SHA1
0b0630173f68ae7d89a8191930b08a9f334a4063
-
SHA256
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3
-
SHA512
51292cc24d753df483d68b6c08b57e81f7ca9cfeac1a7cd1635758404ebd411aaee85e7ff825a18abd4f6ed2d116767b87f9d9117667169011450639c115f599
-
SSDEEP
12288:AMa1a8LrezET3vIU5WmpYshXZPbGwidNpgkF:Fa1a2ezi3vIU5WmD9idNpn
Behavioral task
behavioral1
Sample
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
casino-connector.gl.at.ply.gg:56722
Targets
-
-
Target
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3.bin
-
Size
747KB
-
MD5
318093394469728fff0967b83b37e03a
-
SHA1
0b0630173f68ae7d89a8191930b08a9f334a4063
-
SHA256
069ffb188e3af8ca73bec05de4e86dfdf7b8a55e770fa878dad9125c1a47bda3
-
SHA512
51292cc24d753df483d68b6c08b57e81f7ca9cfeac1a7cd1635758404ebd411aaee85e7ff825a18abd4f6ed2d116767b87f9d9117667169011450639c115f599
-
SSDEEP
12288:AMa1a8LrezET3vIU5WmpYshXZPbGwidNpgkF:Fa1a2ezi3vIU5WmD9idNpn
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-