General
-
Target
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.bin
-
Size
742KB
-
Sample
250130-1yqv2swlgr
-
MD5
674cde64f57ab0536cacdf0bffb28792
-
SHA1
c0b3c25cd57fa52529168502b6e30e2d79c594ca
-
SHA256
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42
-
SHA512
6c236b9094d46eedc7251fc2b5ffa231248982524057f1b100bcc1cff5ed221f80d73941508bdf9f948a5489ad5adcd8ec3404abe2680e990b4b3f2db87f0d8d
-
SSDEEP
12288:kvJ6sgRALznP7WOOKP5WmpYshXZPbGwidNpg/2:EJ6sjLznKOOKP5WmD9idNpp
Behavioral task
behavioral1
Sample
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
24.ip.gl.ply.gg:27203
Targets
-
-
Target
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42.bin
-
Size
742KB
-
MD5
674cde64f57ab0536cacdf0bffb28792
-
SHA1
c0b3c25cd57fa52529168502b6e30e2d79c594ca
-
SHA256
7d9c0ea1e0ee9f0774f5896480b81cc4b49e23d088194dac2743c171d2868b42
-
SHA512
6c236b9094d46eedc7251fc2b5ffa231248982524057f1b100bcc1cff5ed221f80d73941508bdf9f948a5489ad5adcd8ec3404abe2680e990b4b3f2db87f0d8d
-
SSDEEP
12288:kvJ6sgRALznP7WOOKP5WmpYshXZPbGwidNpg/2:EJ6sjLznKOOKP5WmD9idNpp
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-