General
-
Target
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5.bin
-
Size
760KB
-
Sample
250104-1y5dfazkfs
-
MD5
a600619714ff4378c21debe76d743d65
-
SHA1
44c5e1b82fb1de3265219a80db3b91807217ad22
-
SHA256
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5
-
SHA512
017d9ece82217086720b0c397214e4d09c087b06c6a1fc4a197ffa718a57acfd6f77afc8e5765cb25bbf6af135ebb4eade66329a82d13deb8267e0e600ee952f
-
SSDEEP
12288:XcDsra1a8LdeKpUS64Xr5WmpYshXZPbGwidNpgvRj:Fa1a6eK564Xr5WmD9idNp+
Behavioral task
behavioral1
Sample
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
material-my.gl.at.ply.gg:35432
Targets
-
-
Target
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5.bin
-
Size
760KB
-
MD5
a600619714ff4378c21debe76d743d65
-
SHA1
44c5e1b82fb1de3265219a80db3b91807217ad22
-
SHA256
2e4f615787bac07174e4ad46a974762059cea5db98476222eb1c3099333c50a5
-
SHA512
017d9ece82217086720b0c397214e4d09c087b06c6a1fc4a197ffa718a57acfd6f77afc8e5765cb25bbf6af135ebb4eade66329a82d13deb8267e0e600ee952f
-
SSDEEP
12288:XcDsra1a8LdeKpUS64Xr5WmpYshXZPbGwidNpgvRj:Fa1a6eK564Xr5WmD9idNp+
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-