General
-
Target
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.bin
-
Size
748KB
-
Sample
250107-13jyas1lcs
-
MD5
2f75ed762fb1de331837db74a911c5f0
-
SHA1
a3d4cdadb8f373f0921a92571851f3546ec0fc60
-
SHA256
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66
-
SHA512
82486a27a055e1020b57ca0c946d9f12960b307d7143d1eaaa3ff59607467b903d3db015fa05e0a4a542275d8579bae1c579119fad97536223bc529ee7d30cb3
-
SSDEEP
12288:bvpKZb+VDa1a8LVeC42S3/DpgB5WmpYshXZPbGwidNpgT5:j8ZcDa1aKeC4t3NgB5WmD9idNp+
Behavioral task
behavioral1
Sample
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
192.168.0.110:4141
Targets
-
-
Target
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66.bin
-
Size
748KB
-
MD5
2f75ed762fb1de331837db74a911c5f0
-
SHA1
a3d4cdadb8f373f0921a92571851f3546ec0fc60
-
SHA256
132ba93e10998016de1bbe818f4403447026f310a276c5cde1017e6edeb98b66
-
SHA512
82486a27a055e1020b57ca0c946d9f12960b307d7143d1eaaa3ff59607467b903d3db015fa05e0a4a542275d8579bae1c579119fad97536223bc529ee7d30cb3
-
SSDEEP
12288:bvpKZb+VDa1a8LVeC42S3/DpgB5WmpYshXZPbGwidNpgT5:j8ZcDa1aKeC4t3NgB5WmD9idNp+
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-