General
-
Target
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda.bin
-
Size
860KB
-
Sample
250105-1wsxmaxlhv
-
MD5
49180b00b8ed0c7a4892f48e54984c45
-
SHA1
042daf177c34f48ac39a95c81bcad76edd62180b
-
SHA256
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda
-
SHA512
b329992fdb083be4f52f27006d5f9d9ae7c1d8bd878ca954870197279b37bbd593a99e745562e5f103b1f8b135d2c6a2f7b0bb292be81b3f93e22a354c8b8469
-
SSDEEP
12288:sO159lxa1a8LVevGvwtYM2iNsw3fzy5WmpYshXZPbGwidNpgXo:B3xa1aKevGvAYziHzy5WmD9idNp7
Behavioral task
behavioral1
Sample
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
look-islamic.gl.at.ply.gg:40775
Targets
-
-
Target
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda.bin
-
Size
860KB
-
MD5
49180b00b8ed0c7a4892f48e54984c45
-
SHA1
042daf177c34f48ac39a95c81bcad76edd62180b
-
SHA256
26abbdd33c2c94a4fea32a2afdc7247448b920f17594201b5c5197f025448eda
-
SHA512
b329992fdb083be4f52f27006d5f9d9ae7c1d8bd878ca954870197279b37bbd593a99e745562e5f103b1f8b135d2c6a2f7b0bb292be81b3f93e22a354c8b8469
-
SSDEEP
12288:sO159lxa1a8LVevGvwtYM2iNsw3fzy5WmpYshXZPbGwidNpgXo:B3xa1aKevGvAYziHzy5WmD9idNp7
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Tries to add a device administrator.
-