General
-
Target
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.bin
-
Size
760KB
-
Sample
250121-1zngbatjbt
-
MD5
3bdd384b39d0bdf6388f6f9c9ada28d6
-
SHA1
1b331a7874f9ffb5c9380dfeead79530f1049f8d
-
SHA256
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96
-
SHA512
10348bacea8b34681db63193e254ff69f125336e0614722cd3fc357ff5f577811bc489729d82abffa13c9a2940dd70d7b85e350cfa3a03410735ea2dd721b3f3
-
SSDEEP
12288:5PLa1a8Lde1hto3TYw/5WmpYshXZPbGwidNpgBqf:ha1a6e1w3TY25WmD9idNpv
Behavioral task
behavioral1
Sample
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
important-focal.gl.at.ply.gg:24318
Targets
-
-
Target
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96.bin
-
Size
760KB
-
MD5
3bdd384b39d0bdf6388f6f9c9ada28d6
-
SHA1
1b331a7874f9ffb5c9380dfeead79530f1049f8d
-
SHA256
2c47239a938a308c1097504c2a0a7cc653f678521e3f154cc4a920ce747e1d96
-
SHA512
10348bacea8b34681db63193e254ff69f125336e0614722cd3fc357ff5f577811bc489729d82abffa13c9a2940dd70d7b85e350cfa3a03410735ea2dd721b3f3
-
SSDEEP
12288:5PLa1a8Lde1hto3TYw/5WmpYshXZPbGwidNpgBqf:ha1a6e1w3TY25WmD9idNpv
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-