General
-
Target
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5.bin
-
Size
760KB
-
Sample
250102-1yh57szqfj
-
MD5
537da90a383549858965f36b78267e1c
-
SHA1
0e662e4717e92a645f9b2ac116eaa112abe19e26
-
SHA256
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5
-
SHA512
cb3ff48db22442ddf1d96179cc52c76d32ed644c13a3cb26aa0540bc36aeb012fc39f2cd4505966faa09338dda4ad1a8c4258bda1876c6526b27ba467e7564dc
-
SSDEEP
12288:jCbdYa1a8LdelvlhhjLug5WmpYshXZPbGwidNpge2z:jva1a6el3hnug5WmD9idNpC
Behavioral task
behavioral1
Sample
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
6.tcp.eu.ngrok.io:10923
Targets
-
-
Target
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5.bin
-
Size
760KB
-
MD5
537da90a383549858965f36b78267e1c
-
SHA1
0e662e4717e92a645f9b2ac116eaa112abe19e26
-
SHA256
ec1ebda9d6486985812d4e987305103ebc915859c52aea2e46ec779ffb81cdb5
-
SHA512
cb3ff48db22442ddf1d96179cc52c76d32ed644c13a3cb26aa0540bc36aeb012fc39f2cd4505966faa09338dda4ad1a8c4258bda1876c6526b27ba467e7564dc
-
SSDEEP
12288:jCbdYa1a8LdelvlhhjLug5WmpYshXZPbGwidNpge2z:jva1a6el3hnug5WmD9idNpC
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-