General
-
Target
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5.apk
-
Size
775KB
-
Sample
250208-c24djs1pfj
-
MD5
8d2b88688ed3d7950ccff78679fe1be6
-
SHA1
afa616d624875bf2c0bc966b0afdaf52d3b3409d
-
SHA256
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5
-
SHA512
b8b5a369a26676a3ec601cf078962aa31470f5083ae90fed190a954208ba969eca0a6b41dea2eb9b5debc75a7515335e1b34e06b820ff2ff8627b7e3b251e400
-
SSDEEP
12288:U4XuJ6sgRwLzODskNNYOX5WmpYshXZPbGwidNpgX2:UnJ6sbLzODpNaOX5WmD9idNpN
Behavioral task
behavioral1
Sample
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
6.tcp.eu.ngrok.io:16230
Targets
-
-
Target
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5.apk
-
Size
775KB
-
MD5
8d2b88688ed3d7950ccff78679fe1be6
-
SHA1
afa616d624875bf2c0bc966b0afdaf52d3b3409d
-
SHA256
99f467c30f21644ce9d7e060330cafdf082c9798dc151226271309071c83c6e5
-
SHA512
b8b5a369a26676a3ec601cf078962aa31470f5083ae90fed190a954208ba969eca0a6b41dea2eb9b5debc75a7515335e1b34e06b820ff2ff8627b7e3b251e400
-
SSDEEP
12288:U4XuJ6sgRwLzODskNNYOX5WmpYshXZPbGwidNpgX2:UnJ6sbLzODpNaOX5WmD9idNpN
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-