Resubmissions
08-01-2025 03:38
250108-d7eg2ssncy 10General
-
Target
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9
-
Size
18.7MB
-
Sample
250108-d7eg2ssncy
-
MD5
c1bd7281d679534ecd67d493177387fd
-
SHA1
7a6811fc5c0599d86b6b10ad6713175899d3eafb
-
SHA256
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9
-
SHA512
221b89a1be21e6d7f6de3eaecd18d094926852a1501d836a815b6b58583b579b69f285394b68103533ebabf93535ed47aa912ddcc75d4b7c4c134771ffc4dbaf
-
SSDEEP
12288:EHy4hnuZ9LFAyhT6mJLeWb3rjjoCkF3izP1rgU3QiUua4RqjA+dA2kpMUkAhuzYx:4y4wB0KbbjjoR3+d0U6uaolWcqW
Behavioral task
behavioral1
Sample
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
156.240.111.65:1151
Targets
-
-
Target
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9
-
Size
18.7MB
-
MD5
c1bd7281d679534ecd67d493177387fd
-
SHA1
7a6811fc5c0599d86b6b10ad6713175899d3eafb
-
SHA256
852cea014fdae474d9cd76cada3b0debb9340698bfff9f23a912109f5249bca9
-
SHA512
221b89a1be21e6d7f6de3eaecd18d094926852a1501d836a815b6b58583b579b69f285394b68103533ebabf93535ed47aa912ddcc75d4b7c4c134771ffc4dbaf
-
SSDEEP
12288:EHy4hnuZ9LFAyhT6mJLeWb3rjjoCkF3izP1rgU3QiUua4RqjA+dA2kpMUkAhuzYx:4y4wB0KbbjjoR3+d0U6uaolWcqW
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1