General
-
Target
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac.bin
-
Size
760KB
-
Sample
250112-1xpats1ngw
-
MD5
c253a4cf1df100e0271783a1ff8d5595
-
SHA1
f0212d0ab8f69df5363a6090e4ee59f81ee66a0e
-
SHA256
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac
-
SHA512
d40d9b877b9e4ff559008f86e40a6b40e4df7e87f8b361381bfbed39ac840c224be862c13fb233e442b4528ead88a5855fa70e36db2c19aa68328db457fb4721
-
SSDEEP
12288:1eOVOfFxa1a8LdemrVJv/o55WmpYshXZPbGwidNpgEh:1fs/a1a6emnv/o55WmD9idNpf
Behavioral task
behavioral1
Sample
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
december-mm.gl.at.ply.gg:24927
Targets
-
-
Target
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac.bin
-
Size
760KB
-
MD5
c253a4cf1df100e0271783a1ff8d5595
-
SHA1
f0212d0ab8f69df5363a6090e4ee59f81ee66a0e
-
SHA256
b1433306b739c4ff55bd3160cc9b12572ecd22c4346ce01e3f0b0c8df87e9bac
-
SHA512
d40d9b877b9e4ff559008f86e40a6b40e4df7e87f8b361381bfbed39ac840c224be862c13fb233e442b4528ead88a5855fa70e36db2c19aa68328db457fb4721
-
SSDEEP
12288:1eOVOfFxa1a8LdemrVJv/o55WmpYshXZPbGwidNpgEh:1fs/a1a6emnv/o55WmD9idNpf
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-