General
-
Target
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d.bin
-
Size
1.5MB
-
Sample
250121-15k85stlfz
-
MD5
5086acc5519cea2c9ead1188d2641d98
-
SHA1
177dbc206afccd397771100e55f0fa69d421388a
-
SHA256
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d
-
SHA512
6b9ba52864d2a966241871665b31955a0f81d3a6d9eb059c9204065beec5286ac4fa64aff9e90f4b909f622440a42c2b81a2f711f0091fd284255d29e7fa337e
-
SSDEEP
24576:gJ6s1LzmJc+EIO0K4KeGTzaR+imz/goeHvq9DOuzPr5WmD9idNpn:gJ6s8m7t0H/GT+RhM/goeKD75Wk0d/n
Behavioral task
behavioral1
Sample
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
54.207.37.3:10980
Targets
-
-
Target
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d.bin
-
Size
1.5MB
-
MD5
5086acc5519cea2c9ead1188d2641d98
-
SHA1
177dbc206afccd397771100e55f0fa69d421388a
-
SHA256
4acfd4a928f177cc1ab43c0ceb5a6668560de3d36be70c1c932ced08698e957d
-
SHA512
6b9ba52864d2a966241871665b31955a0f81d3a6d9eb059c9204065beec5286ac4fa64aff9e90f4b909f622440a42c2b81a2f711f0091fd284255d29e7fa337e
-
SSDEEP
24576:gJ6s1LzmJc+EIO0K4KeGTzaR+imz/goeHvq9DOuzPr5WmD9idNpn:gJ6s8m7t0H/GT+RhM/goeKD75Wk0d/n
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-