General
-
Target
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30.apk
-
Size
760KB
-
Sample
250209-clz17atkgj
-
MD5
a9eab25994a688d58bf1e933f25b8fae
-
SHA1
d4c27135db1d4bc4dd00fb390c2e3f13f047a9b2
-
SHA256
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30
-
SHA512
a6dfe7a436571eed8a8268b9802775dcc0802f9997432d8547b10ab2eede91cce64a33e11387632029c8986a55c9e0b28577fab86dc8c779e599b4a3a7e5b3d9
-
SSDEEP
12288:itVFa1a8LzectOcc0VN5WmpYshXZPbGwidNpgXw:i1a1amecBc0VN5WmD9idNpz
Behavioral task
behavioral1
Sample
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
county-organize.gl.at.ply.gg:42470
Targets
-
-
Target
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30.apk
-
Size
760KB
-
MD5
a9eab25994a688d58bf1e933f25b8fae
-
SHA1
d4c27135db1d4bc4dd00fb390c2e3f13f047a9b2
-
SHA256
2687631f006d1e550afbcb9806e70b2089cb7132c92de7803de4a1669e259f30
-
SHA512
a6dfe7a436571eed8a8268b9802775dcc0802f9997432d8547b10ab2eede91cce64a33e11387632029c8986a55c9e0b28577fab86dc8c779e599b4a3a7e5b3d9
-
SSDEEP
12288:itVFa1a8LzectOcc0VN5WmpYshXZPbGwidNpgXw:i1a1amecBc0VN5WmD9idNpz
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-