General
-
Target
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.bin
-
Size
760KB
-
Sample
250218-1zb4aazphk
-
MD5
00836ca954adeda28913b561ac2f9740
-
SHA1
e887847c2201483a337354eff56f14584c1ddc4e
-
SHA256
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07
-
SHA512
f8c30e39d376738589cc94c621ec5e2a7123cd685f13b33a2df47f502fff4fa1abe87bef0dec50a42790726e56591b9eadc705ba2cf167a44885e7b44dc2295a
-
SSDEEP
12288:lRp6dCnja1a8LdevF3od1+A5WmpYshXZPbGwidNpgBy:l76sa1a6evOd1+A5WmD9idNpL
Behavioral task
behavioral1
Sample
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
0.tcp.ngrok.io:14051
Targets
-
-
Target
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07.bin
-
Size
760KB
-
MD5
00836ca954adeda28913b561ac2f9740
-
SHA1
e887847c2201483a337354eff56f14584c1ddc4e
-
SHA256
61fb5599c857e0abedd4bd3e99096560060efe57dbb00f37044f08781aac0f07
-
SHA512
f8c30e39d376738589cc94c621ec5e2a7123cd685f13b33a2df47f502fff4fa1abe87bef0dec50a42790726e56591b9eadc705ba2cf167a44885e7b44dc2295a
-
SSDEEP
12288:lRp6dCnja1a8LdevF3od1+A5WmpYshXZPbGwidNpgBy:l76sa1a6evOd1+A5WmD9idNpL
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-