General
-
Target
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.bin
-
Size
760KB
-
Sample
250102-1xxbfazqcp
-
MD5
bf6ae37cf1bff093b046538cf460c11c
-
SHA1
137772df2176640b20f7ca6352336cb01c3b02a5
-
SHA256
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f
-
SHA512
edf5d9ed01bf1729be042265ea8f73818d06ab73b81002af5cc4d8d9ef173586d05c240ddec74cc8cd62e20cf6bb8f66bf74386c63bf44e1e8ad2cc227333a2b
-
SSDEEP
12288:F8TNL7a1a8LdemLRN7u6Ah5WmpYshXZPbGwidNpgghX:FOL7a1a6emD7u6Ah5WmD9idNpLX
Behavioral task
behavioral1
Sample
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
ad-forestry.gl.at.ply.gg:51714
Targets
-
-
Target
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f.bin
-
Size
760KB
-
MD5
bf6ae37cf1bff093b046538cf460c11c
-
SHA1
137772df2176640b20f7ca6352336cb01c3b02a5
-
SHA256
60fad6d37e53b6b1cc72a5b240542bdeb4cd3a370e3855e28d6552d9068c383f
-
SHA512
edf5d9ed01bf1729be042265ea8f73818d06ab73b81002af5cc4d8d9ef173586d05c240ddec74cc8cd62e20cf6bb8f66bf74386c63bf44e1e8ad2cc227333a2b
-
SSDEEP
12288:F8TNL7a1a8LdemLRN7u6Ah5WmpYshXZPbGwidNpgghX:FOL7a1a6emD7u6Ah5WmD9idNpLX
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-