General
-
Target
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.bin
-
Size
772KB
-
Sample
250119-1zgnrsxrev
-
MD5
e11f68853bba026c7ca71c7e00b24b8d
-
SHA1
22b309e1475b92d478e5d7345f2e55d9c1658d3b
-
SHA256
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5
-
SHA512
9b92b6177b06c7bc46715f05cbc507f27b0137297c4dbc0eb7786b863c0517ed18558aa1c449bb965d944681cf8e018eef283f7dec0b183a9d3bda31984e17a3
-
SSDEEP
12288:kfKRSa1a8LreNOR21eGw5WmpYshXZPbGwidNpgrA:k3a1a2eNv1eGw5WmD9idNpn
Behavioral task
behavioral1
Sample
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
7.tcp.eu.ngrok.io:15957
Targets
-
-
Target
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5.bin
-
Size
772KB
-
MD5
e11f68853bba026c7ca71c7e00b24b8d
-
SHA1
22b309e1475b92d478e5d7345f2e55d9c1658d3b
-
SHA256
0f3c79e2f8fe4e620d54c93ad7ff16c1e90f8e55c0c245c21b9b3bdc7fd632a5
-
SHA512
9b92b6177b06c7bc46715f05cbc507f27b0137297c4dbc0eb7786b863c0517ed18558aa1c449bb965d944681cf8e018eef283f7dec0b183a9d3bda31984e17a3
-
SSDEEP
12288:kfKRSa1a8LreNOR21eGw5WmpYshXZPbGwidNpgrA:k3a1a2eNv1eGw5WmD9idNpn
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-