General
-
Target
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.apk
-
Size
783KB
-
Sample
250208-c5cp1a1qfp
-
MD5
2958f55b4ffc21dbfd8d19b8cd538175
-
SHA1
4b073f9d31a2a56839feb3bb364215e04a81dda5
-
SHA256
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759
-
SHA512
d952f0ea3ce0d3ad32489f857b4bc8ec8aa5306395d1628cf85facc4786c7c4f90bd38b853257071f991a80c65dde64936595a5ca6f9268d572ed7c91de47efb
-
SSDEEP
12288:6Za1a8Lze+ITqPWE75WmpYshXZPbGwidNpgnM:+a1ame+RPWE75WmD9idNpn
Behavioral task
behavioral1
Sample
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
sep-reseller.gl.at.ply.gg:51936
Targets
-
-
Target
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759.apk
-
Size
783KB
-
MD5
2958f55b4ffc21dbfd8d19b8cd538175
-
SHA1
4b073f9d31a2a56839feb3bb364215e04a81dda5
-
SHA256
e393732e077878b145d853db575315a0e1da1fee75deba927c27dcaec9c74759
-
SHA512
d952f0ea3ce0d3ad32489f857b4bc8ec8aa5306395d1628cf85facc4786c7c4f90bd38b853257071f991a80c65dde64936595a5ca6f9268d572ed7c91de47efb
-
SSDEEP
12288:6Za1a8Lze+ITqPWE75WmpYshXZPbGwidNpgnM:+a1ame+RPWE75WmD9idNpn
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-