General
-
Target
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4.bin
-
Size
760KB
-
Sample
250102-1wmevazpfq
-
MD5
4e755608e3b9e808914c7ad95015d648
-
SHA1
bb455e3c65f432b6e46a4f5838e23669afcfd5d2
-
SHA256
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4
-
SHA512
e3f735f021858e7e81eeff5a1f897e9d0e0ddec29b9ce7901543176e79746b874d27af6ca78c8d0a7025a2522c2770d8e7291d1331d6462ed227f700fea99b81
-
SSDEEP
12288:VcBE6cWGNJ6sgR8LzJcNA/64H5WmpYshXZPbGwidNpgMa:VcGNNJ6stLzJl/64H5WmD9idNpQ
Behavioral task
behavioral1
Sample
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
printer-weblogs.gl.at.ply.gg:56304
Targets
-
-
Target
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4.bin
-
Size
760KB
-
MD5
4e755608e3b9e808914c7ad95015d648
-
SHA1
bb455e3c65f432b6e46a4f5838e23669afcfd5d2
-
SHA256
e89cd009d9db673ed0f598b9c69a6b59b11540461936d97af33c932a114d43c4
-
SHA512
e3f735f021858e7e81eeff5a1f897e9d0e0ddec29b9ce7901543176e79746b874d27af6ca78c8d0a7025a2522c2770d8e7291d1331d6462ed227f700fea99b81
-
SSDEEP
12288:VcBE6cWGNJ6sgR8LzJcNA/64H5WmpYshXZPbGwidNpgMa:VcGNNJ6stLzJl/64H5WmD9idNpQ
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-