General
-
Target
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01.bin
-
Size
751KB
-
Sample
250119-1z8r9axrhx
-
MD5
aaf78d4fc5fb60b03f0bd524f0b8e701
-
SHA1
f8f7ac08b4c940b4c9eaada69671adf93a85253d
-
SHA256
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01
-
SHA512
bc9550b22e483a0827b89815c980b763c90fbf2e923604c5ecca37322bc3e73b27f848cf0b1b0ae72c1cf899afb877a55fef2e321085480ed5f785a44dd03cb6
-
SSDEEP
12288:GMJ6sgRQLzQCEf8xEt5WmpYshXZPbGwidNpgUc:FJ6sjLzQXf8xEt5WmD9idNpq
Behavioral task
behavioral1
Sample
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
helloGBOARD42-55713.portmap.host:55713
Targets
-
-
Target
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01.bin
-
Size
751KB
-
MD5
aaf78d4fc5fb60b03f0bd524f0b8e701
-
SHA1
f8f7ac08b4c940b4c9eaada69671adf93a85253d
-
SHA256
4ff9f0e6d9043467b530dcd189cbcf281a9a6608b9f7452a4d0dc237e95dbb01
-
SHA512
bc9550b22e483a0827b89815c980b763c90fbf2e923604c5ecca37322bc3e73b27f848cf0b1b0ae72c1cf899afb877a55fef2e321085480ed5f785a44dd03cb6
-
SSDEEP
12288:GMJ6sgRQLzQCEf8xEt5WmpYshXZPbGwidNpgUc:FJ6sjLzQXf8xEt5WmD9idNpq
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-