General
-
Target
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a.bin
-
Size
760KB
-
Sample
250113-1zkqesynb1
-
MD5
0dbf59580e90430ebe9702ca3c6e2d7a
-
SHA1
65020fb5e4af1066714e8cdd9719267062d70ebb
-
SHA256
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a
-
SHA512
e95c98986e5373ff7e7b966b715365f403f84bfaf84424e2d845c660f291fbe2eac481e4d60e3dac7880b46b98c1b6d0072cd8ad8ced0fcb55b477fbf1fbaf6a
-
SSDEEP
12288:FKO/wWEa1a8Ldeu3YbgNNh5WmpYshXZPbGwidNpg1b:Fz8a1a6eumgNNh5WmD9idNpK
Behavioral task
behavioral1
Sample
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
his-flush.gl.at.ply.gg:17098
Targets
-
-
Target
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a.bin
-
Size
760KB
-
MD5
0dbf59580e90430ebe9702ca3c6e2d7a
-
SHA1
65020fb5e4af1066714e8cdd9719267062d70ebb
-
SHA256
043da455c8eb9a5102994975cad4611d7cd2d7087c6a040bbef5f8b684c7836a
-
SHA512
e95c98986e5373ff7e7b966b715365f403f84bfaf84424e2d845c660f291fbe2eac481e4d60e3dac7880b46b98c1b6d0072cd8ad8ced0fcb55b477fbf1fbaf6a
-
SSDEEP
12288:FKO/wWEa1a8Ldeu3YbgNNh5WmpYshXZPbGwidNpg1b:Fz8a1a6eumgNNh5WmD9idNpK
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-