General
-
Target
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.bin
-
Size
760KB
-
Sample
250107-12jada1kgy
-
MD5
8d821ffc8a3872c81cb140a31c706395
-
SHA1
d6de3912b0cfc158bb40d277a133d2e570bb8ae1
-
SHA256
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de
-
SHA512
9e405671ba8a7f8b5a0b77117511cb14e72a413ad9e27f09e27d5dfdeb030198db6f86ca7a268a3a0e63b9e88fe75babe1de2c0308c673cadeac3ace6c9f2696
-
SSDEEP
12288:b/CVzcBZRvS0qZB1i/gYu5WmpYshXZPbGwidNpg/k:bqGBZRrqZK/gYu5WmD9idNpr
Behavioral task
behavioral1
Sample
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
ad-forestry.gl.at.ply.gg:51714
Targets
-
-
Target
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de.bin
-
Size
760KB
-
MD5
8d821ffc8a3872c81cb140a31c706395
-
SHA1
d6de3912b0cfc158bb40d277a133d2e570bb8ae1
-
SHA256
6daa1640a1c19142b7c20f16e43691472fd106c256afddd0064f1190b0a245de
-
SHA512
9e405671ba8a7f8b5a0b77117511cb14e72a413ad9e27f09e27d5dfdeb030198db6f86ca7a268a3a0e63b9e88fe75babe1de2c0308c673cadeac3ace6c9f2696
-
SSDEEP
12288:b/CVzcBZRvS0qZB1i/gYu5WmpYshXZPbGwidNpg/k:bqGBZRrqZK/gYu5WmD9idNpr
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-