General
-
Target
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd.bin
-
Size
777KB
-
Sample
250121-15kbvatrbl
-
MD5
b2ccbc94188fd78793a43bb6800f8ef4
-
SHA1
22f58641c6b26a36d715535a396ba737af030113
-
SHA256
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd
-
SHA512
3d525dfd8c8dd5070348bbca48d4899a6cf9da7e5074625e73b9975c91039787592898d43a65bfbecd053051d71572abb9ba532ef646ae467b21620510bc238a
-
SSDEEP
12288:GDyu2TV1a1a8LzeJYU8AgVpsC5WmpYshXZPbGwidNpg33:Geuw1a1ameJYBASpF5WmD9idNpI
Behavioral task
behavioral1
Sample
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
DobriyKaban-42278.portmap.host:42278
Targets
-
-
Target
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd.bin
-
Size
777KB
-
MD5
b2ccbc94188fd78793a43bb6800f8ef4
-
SHA1
22f58641c6b26a36d715535a396ba737af030113
-
SHA256
7f48be28901f7489316b9fb80ba69c2f02448b54417a56ebc8e89b4b66bce7fd
-
SHA512
3d525dfd8c8dd5070348bbca48d4899a6cf9da7e5074625e73b9975c91039787592898d43a65bfbecd053051d71572abb9ba532ef646ae467b21620510bc238a
-
SSDEEP
12288:GDyu2TV1a1a8LzeJYU8AgVpsC5WmpYshXZPbGwidNpg33:Geuw1a1ameJYBASpF5WmD9idNpI
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-