General
-
Target
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.bin
-
Size
768KB
-
Sample
250212-1yq6taypbj
-
MD5
3c8d9bf5f11bac573dfa056bbc8c9489
-
SHA1
75525dec35a1d6ca70306395d2921c7f4c281f5f
-
SHA256
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d
-
SHA512
b6520647c1969f05e78185bd17f37de71d4edeb72d6ed0a519157d6e1b398f31699d519b9e8a3dfd3b81d21f5c4564fe89d8a177c1077176c10941206362d150
-
SSDEEP
12288:A2FtmSHGC47DwrAbSj+oA5WmpYshXZPbGwidNpgvV:JFtjmC47DwrAbHX5WmD9idNpeV
Behavioral task
behavioral1
Sample
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
serveo.net:9585
Targets
-
-
Target
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d.bin
-
Size
768KB
-
MD5
3c8d9bf5f11bac573dfa056bbc8c9489
-
SHA1
75525dec35a1d6ca70306395d2921c7f4c281f5f
-
SHA256
e51d1928e8ac379cfb215ed70bd4ec5d8c166332fd7f8d77b71f223dafaf5c0d
-
SHA512
b6520647c1969f05e78185bd17f37de71d4edeb72d6ed0a519157d6e1b398f31699d519b9e8a3dfd3b81d21f5c4564fe89d8a177c1077176c10941206362d150
-
SSDEEP
12288:A2FtmSHGC47DwrAbSj+oA5WmpYshXZPbGwidNpgvV:JFtjmC47DwrAbHX5WmD9idNpeV
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-