General
-
Target
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.bin
-
Size
760KB
-
Sample
250121-11aa3stngl
-
MD5
3e25d7cb7fb34648c825213f630962aa
-
SHA1
3aed04fa87764cf84f5704cd52e1d9ec659722b1
-
SHA256
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3
-
SHA512
3315574e6dc5432cc998b063ddee1318d546687c56cb1f3f57184b085f9f221332ecd57219dc8f71f2ed92aa1e0a98b3636f22661cdf421fcaeca1341abb55ab
-
SSDEEP
12288:nvM+LHPa1a8LreD8fkaAXx5WmpYshXZPbGwidNpgZh:nvMka1a2eDDaAXx5WmD9idNp0
Behavioral task
behavioral1
Sample
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
192.168.0.104:9595
Targets
-
-
Target
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3.bin
-
Size
760KB
-
MD5
3e25d7cb7fb34648c825213f630962aa
-
SHA1
3aed04fa87764cf84f5704cd52e1d9ec659722b1
-
SHA256
409d21e37642d33fbb4acf140b50c2f654320031c12b503778699bd0c43c97f3
-
SHA512
3315574e6dc5432cc998b063ddee1318d546687c56cb1f3f57184b085f9f221332ecd57219dc8f71f2ed92aa1e0a98b3636f22661cdf421fcaeca1341abb55ab
-
SSDEEP
12288:nvM+LHPa1a8LreD8fkaAXx5WmpYshXZPbGwidNpgZh:nvMka1a2eDDaAXx5WmD9idNp0
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-