General
-
Target
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee.bin
-
Size
760KB
-
Sample
250209-1xfzfstrcp
-
MD5
92c2ceefc9b42275b539942fefefdd91
-
SHA1
06f3807a40727a459d09310ebae70f7d9a66e9b0
-
SHA256
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee
-
SHA512
db2e68cd5a34d10cc34dd24b7d1d9a30d95b09d07aa4155ac1ba6eaddae6b879ea9979aec17d89b90218736920925b6073e2d7be32e3a7310c59284d4db27c3f
-
SSDEEP
12288:h4NvLxa1a8LVern/7HIIq5WmpYshXZPbGwidNpgwNg:h4da1aKerTHIIq5WmD9idNp+
Behavioral task
behavioral1
Sample
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
together-wanted.gl.at.ply.gg:56616
Targets
-
-
Target
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee.bin
-
Size
760KB
-
MD5
92c2ceefc9b42275b539942fefefdd91
-
SHA1
06f3807a40727a459d09310ebae70f7d9a66e9b0
-
SHA256
74df1aea39d85d36492dec1891ff354b9685a0c6d5cc9ae7b8c213ef821979ee
-
SHA512
db2e68cd5a34d10cc34dd24b7d1d9a30d95b09d07aa4155ac1ba6eaddae6b879ea9979aec17d89b90218736920925b6073e2d7be32e3a7310c59284d4db27c3f
-
SSDEEP
12288:h4NvLxa1a8LVern/7HIIq5WmpYshXZPbGwidNpgwNg:h4da1aKerTHIIq5WmD9idNp+
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-