General
-
Target
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8.bin
-
Size
760KB
-
Sample
250101-1xdt4awqgs
-
MD5
f89b8328e41a84775f81e609b4b28451
-
SHA1
1e1b89f35ad335c98afb5675db50662ad4c19d68
-
SHA256
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8
-
SHA512
1cfa04b4583c48fd256384f4e8264b9603f0d7bc2072adbacc8f1fed34b7bb8cc55b43612b18d13bc9bc298e64e4a6b6ec2c26bab28fa9e52a762a7160475156
-
SSDEEP
12288:HM+qEca1a8LreJ/BV1MKE5WmpYshXZPbGwidNpg51:HMVa1a2eJP1MKE5WmD9idNpM
Behavioral task
behavioral1
Sample
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
reports-type.gl.at.ply.gg:38463
Targets
-
-
Target
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8.bin
-
Size
760KB
-
MD5
f89b8328e41a84775f81e609b4b28451
-
SHA1
1e1b89f35ad335c98afb5675db50662ad4c19d68
-
SHA256
6474eedcedfd38d860fffc7ee2098ba1738d6adca9ccdf5c26e60fd46344d9c8
-
SHA512
1cfa04b4583c48fd256384f4e8264b9603f0d7bc2072adbacc8f1fed34b7bb8cc55b43612b18d13bc9bc298e64e4a6b6ec2c26bab28fa9e52a762a7160475156
-
SSDEEP
12288:HM+qEca1a8LreJ/BV1MKE5WmpYshXZPbGwidNpg51:HMVa1a2eJP1MKE5WmD9idNpM
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-