General
-
Target
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.bin
-
Size
784KB
-
Sample
250215-1yccnawphj
-
MD5
4563b843f79f5ef48e91b2ccaf838c6a
-
SHA1
1595dbd5913705c19fd9238f6463f617434ba571
-
SHA256
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb
-
SHA512
8b51ede15f9f63198166211a108bb41155610f22b2d865e90f346fed8221df0d8203f8562598fd56e18f0cd62f7c9a1673f476c45b7349f99bec90272352b9da
-
SSDEEP
12288:KQt/0ua1a8LdenRe99asv5qA5WmpYshXZPbGwidNpgf4O:nXa1a6enRi9Z5qA5WmD9idNpy
Behavioral task
behavioral1
Sample
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
184.174.97.115:5002
Targets
-
-
Target
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb.bin
-
Size
784KB
-
MD5
4563b843f79f5ef48e91b2ccaf838c6a
-
SHA1
1595dbd5913705c19fd9238f6463f617434ba571
-
SHA256
7e20095795440d2ed3a963830470044058089063078b4a7bb7759a6e56155cfb
-
SHA512
8b51ede15f9f63198166211a108bb41155610f22b2d865e90f346fed8221df0d8203f8562598fd56e18f0cd62f7c9a1673f476c45b7349f99bec90272352b9da
-
SSDEEP
12288:KQt/0ua1a8LdenRe99asv5qA5WmpYshXZPbGwidNpgf4O:nXa1a6enRi9Z5qA5WmD9idNpy
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-