General
-
Target
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.bin
-
Size
760KB
-
Sample
250103-1y8qvswjfw
-
MD5
5e5a605b500ad8c90aa420bd6180234b
-
SHA1
6abf33b0e2232ad570d217485932b80e31d22b12
-
SHA256
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3
-
SHA512
03273dcaa001fbd99e75a2f46187e26bd22c0ef04d596089ef14d827d783cc44381d7356498e8164a996f89e8ccafffeb09a1c1acd606dcf54336d687e488cd5
-
SSDEEP
12288:lc2H6ba1a8LzekLaFWHH75WmpYshXZPbGwidNpgXCY:l8ba1amekuWHH75WmD9idNpgD
Behavioral task
behavioral1
Sample
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
web-track.gl.at.ply.gg:58083
Targets
-
-
Target
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3.bin
-
Size
760KB
-
MD5
5e5a605b500ad8c90aa420bd6180234b
-
SHA1
6abf33b0e2232ad570d217485932b80e31d22b12
-
SHA256
3e4b319fd536adf644eade39835906729b345481410af47f645656d649f8a9f3
-
SHA512
03273dcaa001fbd99e75a2f46187e26bd22c0ef04d596089ef14d827d783cc44381d7356498e8164a996f89e8ccafffeb09a1c1acd606dcf54336d687e488cd5
-
SSDEEP
12288:lc2H6ba1a8LzekLaFWHH75WmpYshXZPbGwidNpgXCY:l8ba1amekuWHH75WmD9idNpgD
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-