General
-
Target
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3.bin
-
Size
760KB
-
Sample
250213-13ba6awmbq
-
MD5
7ac87e6bcf07146096141a38d9adae83
-
SHA1
a60ab208d9388fd6d75adff67a88b672667aa87a
-
SHA256
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3
-
SHA512
a60740160cf6e51e14175ce0fdeafd73efa363f004501d21ab19596ca9538313885e77e5f30f9a0d51bb80540abc9a8d3a370075f7d67d8b10ba21ecd5ea24a3
-
SSDEEP
12288:qb6bCCa1a8LreszK5KXLL5WmpYshXZPbGwidNpge+:qMa1a2esCKXLL5WmD9idNpK
Behavioral task
behavioral1
Sample
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
liberiumTOP-59052.portmap.host:59052
Targets
-
-
Target
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3.bin
-
Size
760KB
-
MD5
7ac87e6bcf07146096141a38d9adae83
-
SHA1
a60ab208d9388fd6d75adff67a88b672667aa87a
-
SHA256
2e30514c1bb0393bb80823f6e29d85200cf78e3faba5b53d9041b3fc711fd6e3
-
SHA512
a60740160cf6e51e14175ce0fdeafd73efa363f004501d21ab19596ca9538313885e77e5f30f9a0d51bb80540abc9a8d3a370075f7d67d8b10ba21ecd5ea24a3
-
SSDEEP
12288:qb6bCCa1a8LreszK5KXLL5WmpYshXZPbGwidNpge+:qMa1a2esCKXLL5WmD9idNpK
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-