General
-
Target
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6.bin
-
Size
760KB
-
Sample
250119-11krtayjax
-
MD5
3ca4e51f5db4e63a86da9181b2208cae
-
SHA1
55d6d52b2a6ff42b0346c4e4b7dddc10e4924b7a
-
SHA256
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6
-
SHA512
3fd9c578e5200ad071ffef8132223b199f99a13f5c60d425bc23fa6d36ddeb5fa193412429bc4d4407bfa49ed2229b6719bd2ff404ce52bdea10fa15ae3fc948
-
SSDEEP
12288:LW1pIVOa1a8LVeADixW3LD5WmpYshXZPbGwidNpgCG:LW3a1aKeA+W3LD5WmD9idNpy
Behavioral task
behavioral1
Sample
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
president-update.gl.at.ply.gg:21619
Targets
-
-
Target
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6.bin
-
Size
760KB
-
MD5
3ca4e51f5db4e63a86da9181b2208cae
-
SHA1
55d6d52b2a6ff42b0346c4e4b7dddc10e4924b7a
-
SHA256
622e912874ef0009419ae4de67d22771390518dc6a5d8d076e1bdcac727edcc6
-
SHA512
3fd9c578e5200ad071ffef8132223b199f99a13f5c60d425bc23fa6d36ddeb5fa193412429bc4d4407bfa49ed2229b6719bd2ff404ce52bdea10fa15ae3fc948
-
SSDEEP
12288:LW1pIVOa1a8LVeADixW3LD5WmpYshXZPbGwidNpgCG:LW3a1aKeA+W3LD5WmD9idNpy
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-