General
-
Target
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.bin
-
Size
748KB
-
Sample
250110-1w6tgszkbz
-
MD5
647b28e5b50870c13ca0b4076fcbab9d
-
SHA1
9ce6259ae8a73c91160a07579daac8f932aa4be7
-
SHA256
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702
-
SHA512
d7532fd2cd8a091728e69b820875b009abaa08c9103a5c856a72e3d2d9b2dfa24a8bf9f39e9a48dce376ce784bb5dec1f23daadaa0b3423d14551a96e8d93160
-
SSDEEP
12288:GRhcwJ6sgRnLz4DqeUXtv5WmpYshXZPbGwidNpgLX:ChPJ6scLzI5UXtv5WmD9idNpk
Behavioral task
behavioral1
Sample
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
25.ip.gl.ply.gg:6614
Targets
-
-
Target
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702.bin
-
Size
748KB
-
MD5
647b28e5b50870c13ca0b4076fcbab9d
-
SHA1
9ce6259ae8a73c91160a07579daac8f932aa4be7
-
SHA256
aa044fafedef958c99e585315678779b590d7bb4b6f9018043ce32baf5c84702
-
SHA512
d7532fd2cd8a091728e69b820875b009abaa08c9103a5c856a72e3d2d9b2dfa24a8bf9f39e9a48dce376ce784bb5dec1f23daadaa0b3423d14551a96e8d93160
-
SSDEEP
12288:GRhcwJ6sgRnLz4DqeUXtv5WmpYshXZPbGwidNpgLX:ChPJ6scLzI5UXtv5WmD9idNpk
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-