General
-
Target
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9.bin
-
Size
868KB
-
Sample
250102-1xqhwszqbp
-
MD5
fe6908ca61bf579036738def1165cc7d
-
SHA1
9a339cff74403435f36bffc9938c77459274439e
-
SHA256
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9
-
SHA512
bef8e5611716548bd36b31dd92cb65771e0d93128bf339ea17a79a0ca42b956830afabff60409fcb5c54df3b75bb6a623888db560b8ea397500b9433e8b812e1
-
SSDEEP
12288:lbaOxwMsqa1a8LVe1bUzOcN/+W8HnDb5WmpYshXZPbGwidNpg1L:tauwMsqa1aKe1gOi+ZHnDb5WmD9idNpi
Behavioral task
behavioral1
Sample
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
break-lounge.gl.at.ply.gg:47852
Targets
-
-
Target
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9.bin
-
Size
868KB
-
MD5
fe6908ca61bf579036738def1165cc7d
-
SHA1
9a339cff74403435f36bffc9938c77459274439e
-
SHA256
bcc04ff46fed1173c126bebef4ec8ec858a836690018a330c8e51ad33a3d9df9
-
SHA512
bef8e5611716548bd36b31dd92cb65771e0d93128bf339ea17a79a0ca42b956830afabff60409fcb5c54df3b75bb6a623888db560b8ea397500b9433e8b812e1
-
SSDEEP
12288:lbaOxwMsqa1a8LVe1bUzOcN/+W8HnDb5WmpYshXZPbGwidNpg1L:tauwMsqa1aKe1gOi+ZHnDb5WmD9idNpi
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-