General
-
Target
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.bin
-
Size
757KB
-
Sample
250126-1w9kdawkaw
-
MD5
0d6eb34cacc613e925c7b22de502eb8c
-
SHA1
818d31e3407cf36bc9654421dc4c08df9f386c85
-
SHA256
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36
-
SHA512
c3cecb2a6a3ec40f22b18b845093e5685fb0fd3a336f20185cb444df51fab1175ef70dd2c8e427fb73a9e1bd1b8ba3d6e2cd53e34a611220cf815de6602771e7
-
SSDEEP
12288:wOEG9a1a8LzeQ6ylJDBVDI685WmpYshXZPbGwidNpgLW:NEka1ameqlJNVc685WmD9idNpB
Behavioral task
behavioral1
Sample
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
a-protecting.gl.at.ply.gg:33977
Targets
-
-
Target
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36.bin
-
Size
757KB
-
MD5
0d6eb34cacc613e925c7b22de502eb8c
-
SHA1
818d31e3407cf36bc9654421dc4c08df9f386c85
-
SHA256
492f7f40145e0c0870d50a84da9acad7c9613c427e24ddd1e9f707519179cd36
-
SHA512
c3cecb2a6a3ec40f22b18b845093e5685fb0fd3a336f20185cb444df51fab1175ef70dd2c8e427fb73a9e1bd1b8ba3d6e2cd53e34a611220cf815de6602771e7
-
SSDEEP
12288:wOEG9a1a8LzeQ6ylJDBVDI685WmpYshXZPbGwidNpgLW:NEka1ameqlJNVc685WmD9idNpB
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-