General
-
Target
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff.bin
-
Size
762KB
-
Sample
250119-11s37ayjbv
-
MD5
4be4c00911e7787530b47ac09b99d9db
-
SHA1
d045e2374640738b3eea75f02897f744a42a50b0
-
SHA256
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff
-
SHA512
a682756e197e6fb8d49a78987dceebfabf8b64833a1b1d15245d21cb370326b4b9a5e8f7238c64fd098c23ea10484fdc3a2e635c13f2c76ac233f9851cf5f131
-
SSDEEP
12288:1DnRJ6sgRALzr520zdrfbwGS+ZE58tRrf736a:1NJ6s7Lzr00zdrfbw9Oi8tJD
Behavioral task
behavioral1
Sample
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
ebat-58871.portmap.host:56995
Targets
-
-
Target
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff.bin
-
Size
762KB
-
MD5
4be4c00911e7787530b47ac09b99d9db
-
SHA1
d045e2374640738b3eea75f02897f744a42a50b0
-
SHA256
4305036bbd99856d6ee8f26f1c8b16db1f513bb80bc4d0dd1e00c82c9ae732ff
-
SHA512
a682756e197e6fb8d49a78987dceebfabf8b64833a1b1d15245d21cb370326b4b9a5e8f7238c64fd098c23ea10484fdc3a2e635c13f2c76ac233f9851cf5f131
-
SSDEEP
12288:1DnRJ6sgRALzr520zdrfbwGS+ZE58tRrf736a:1NJ6s7Lzr00zdrfbw9Oi8tJD
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-