General
-
Target
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.bin
-
Size
760KB
-
Sample
250213-13apmawmbp
-
MD5
0c07b87d3d9e4dd03bf019a9186097d1
-
SHA1
2f8263c1676b047acc3dd7ac166eb1d313c9a8da
-
SHA256
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72
-
SHA512
a49f4f0a4e61d83c7e058df918dfa411aab2477e4d5cb97f4885e41f6825ab6e44d2aa3c69e3cd9b2a53d1fdcf0c224d85ea129ab3f7ca4108ac4c40216cde7c
-
SSDEEP
12288:PhOVYwV6La1a8LrexrFtFQOY5WmpYshXZPbGwidNpghE5:P8CPa1a2exbFQOY5WmD9idNpZ
Behavioral task
behavioral1
Sample
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
0.tcp.ngrok.io:14051
Targets
-
-
Target
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72.bin
-
Size
760KB
-
MD5
0c07b87d3d9e4dd03bf019a9186097d1
-
SHA1
2f8263c1676b047acc3dd7ac166eb1d313c9a8da
-
SHA256
74f9346c6ca107c7a6d51aeee9acde52d66cb1db400ea8f7748c0aa56abb3f72
-
SHA512
a49f4f0a4e61d83c7e058df918dfa411aab2477e4d5cb97f4885e41f6825ab6e44d2aa3c69e3cd9b2a53d1fdcf0c224d85ea129ab3f7ca4108ac4c40216cde7c
-
SSDEEP
12288:PhOVYwV6La1a8LrexrFtFQOY5WmpYshXZPbGwidNpghE5:P8CPa1a2exbFQOY5WmD9idNpZ
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-