General
-
Target
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.bin
-
Size
746KB
-
Sample
250219-1xbpqszpcq
-
MD5
385f3c463073b26073e8ab94a0558b01
-
SHA1
e2bb4a6490a3b04b0b78ed55ada472537e1f0596
-
SHA256
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52
-
SHA512
689ea40334e7826e772dec4ddebb8d0a1eec9ebf61c0f849a2d49569f67be4392a110173557aa6374a539c20b4bcda7ec0c5907e277c1344152dbd739248da86
-
SSDEEP
12288:2m2U/a1a8LdeLb9g2SDjK5WmpYshXZPbGwidNpgat4:7Fa1a6eLb9PSDjK5WmD9idNpZC
Behavioral task
behavioral1
Sample
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
26.ip.gl.ply.gg:9039
Targets
-
-
Target
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52.bin
-
Size
746KB
-
MD5
385f3c463073b26073e8ab94a0558b01
-
SHA1
e2bb4a6490a3b04b0b78ed55ada472537e1f0596
-
SHA256
b7baa1b447a5790df807bc983a9176a6dcee192290c5698ef90e0fbc7793fa52
-
SHA512
689ea40334e7826e772dec4ddebb8d0a1eec9ebf61c0f849a2d49569f67be4392a110173557aa6374a539c20b4bcda7ec0c5907e277c1344152dbd739248da86
-
SSDEEP
12288:2m2U/a1a8LdeLb9g2SDjK5WmpYshXZPbGwidNpgat4:7Fa1a6eLb9PSDjK5WmD9idNpZC
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-