General
-
Target
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.bin
-
Size
773KB
-
Sample
250102-1ye4jsxlhz
-
MD5
b828d7ec8bace54b340487c2aef6582c
-
SHA1
33c8a051f756de397476a8ff5421d85d59053589
-
SHA256
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf
-
SHA512
76bd048b980075965f38b704a52d9b91a29b49eb6fcc81cb733e0227f8db04c1bc71414785373b110c65b5ee05f1f86b89b184be0c6e447249970d579c56415b
-
SSDEEP
12288:E0a1a8LrerhPfnLtAd5WmpYshXZPbGwidNpgyu:Fa1a2erlnhAd5WmD9idNp2
Behavioral task
behavioral1
Sample
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
5.tcp.eu.ngrok.io:17528
Targets
-
-
Target
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf.bin
-
Size
773KB
-
MD5
b828d7ec8bace54b340487c2aef6582c
-
SHA1
33c8a051f756de397476a8ff5421d85d59053589
-
SHA256
9cc75b12444ef0fe6d629799c1f1a318db747f480d210a8901f5d667a468dccf
-
SHA512
76bd048b980075965f38b704a52d9b91a29b49eb6fcc81cb733e0227f8db04c1bc71414785373b110c65b5ee05f1f86b89b184be0c6e447249970d579c56415b
-
SSDEEP
12288:E0a1a8LrerhPfnLtAd5WmpYshXZPbGwidNpgyu:Fa1a2erlnhAd5WmD9idNp2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-