General
-
Target
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.bin
-
Size
1.8MB
-
Sample
250126-1w7e1sxkbm
-
MD5
79aec0df863d69f4b2b69c29afa76b37
-
SHA1
3ad17cc16fb53af42393ea21c5a90f2254767e9d
-
SHA256
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de
-
SHA512
c0bf31d15c62e2b90a73afc08f8f6b44411e9060b665690353f6b47a1751b5b31e53d4f2f8106c25c0456fb89d4fc7f711f267abc3e3738eec569cc012f66b19
-
SSDEEP
49152:G/JJZ1TWFzJznMj9zb3fxKvqF2lL/KIr40tgJPR:G/JJHq/TMxrfxKFlL/cv
Behavioral task
behavioral1
Sample
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
a-protecting.gl.at.ply.gg:33977
Targets
-
-
Target
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de.bin
-
Size
1.8MB
-
MD5
79aec0df863d69f4b2b69c29afa76b37
-
SHA1
3ad17cc16fb53af42393ea21c5a90f2254767e9d
-
SHA256
b4e75055f7e222513155c14d20bf5cadccabb5cc3508b7542028a0485e3fc9de
-
SHA512
c0bf31d15c62e2b90a73afc08f8f6b44411e9060b665690353f6b47a1751b5b31e53d4f2f8106c25c0456fb89d4fc7f711f267abc3e3738eec569cc012f66b19
-
SSDEEP
49152:G/JJZ1TWFzJznMj9zb3fxKvqF2lL/KIr40tgJPR:G/JJHq/TMxrfxKFlL/cv
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-