General
-
Target
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc.bin
-
Size
760KB
-
Sample
250108-1zvwdsxqfr
-
MD5
004b864c6e3c088892681e5e532719a6
-
SHA1
5913c4694f89e9ef5f0d1bc727d8af70987d3887
-
SHA256
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc
-
SHA512
b1699daf597116f2c69ba4215b058f13a80e30d840b274f18e3d46c7fe67ea54fc68c103a3b93d0a33abe14bba99fbcf60e7791a80b680ab5f159aa7ce867d16
-
SSDEEP
12288:3MLma1a8LVeJtau8X72Wm5WmpYshXZPbGwidNpghT5:3la1aKeJT8r2Wm5WmD9idNpSt
Behavioral task
behavioral1
Sample
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
providing-recent.gl.at.ply.gg:55004
Targets
-
-
Target
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc.bin
-
Size
760KB
-
MD5
004b864c6e3c088892681e5e532719a6
-
SHA1
5913c4694f89e9ef5f0d1bc727d8af70987d3887
-
SHA256
ae9fbde8ccba1b8196bb082428d113ea5fa1c1833b762b85948f5631bceb85cc
-
SHA512
b1699daf597116f2c69ba4215b058f13a80e30d840b274f18e3d46c7fe67ea54fc68c103a3b93d0a33abe14bba99fbcf60e7791a80b680ab5f159aa7ce867d16
-
SSDEEP
12288:3MLma1a8LVeJtau8X72Wm5WmpYshXZPbGwidNpghT5:3la1aKeJT8r2Wm5WmD9idNpSt
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-