General
-
Target
client.apk
-
Size
760KB
-
Sample
250219-apjr9svj17
-
MD5
19facbc4b94f964fdc19430d9735f161
-
SHA1
e071765338f67965a297f0856ed3bd90c36e9ca1
-
SHA256
1e2db7b10f70c84b001be796c869c4b03416d387898c5beaf4d6b98e092e2874
-
SHA512
bf79175644f37cf739813191f9f58d016edc39608c45cfe038e63869b551698074ef155d401a3d1c6760d76e06ffff8333d3aa18ecbf5e5447f6129a530538df
-
SSDEEP
12288:0uyDa1a8LreR/xtM3HC55WmpYshXZPbGwidNpgPTm:0ja1a2eR/c3HC55WmD9idNpga
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
client.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
83.38.24.1:1603
Targets
-
-
Target
client.apk
-
Size
760KB
-
MD5
19facbc4b94f964fdc19430d9735f161
-
SHA1
e071765338f67965a297f0856ed3bd90c36e9ca1
-
SHA256
1e2db7b10f70c84b001be796c869c4b03416d387898c5beaf4d6b98e092e2874
-
SHA512
bf79175644f37cf739813191f9f58d016edc39608c45cfe038e63869b551698074ef155d401a3d1c6760d76e06ffff8333d3aa18ecbf5e5447f6129a530538df
-
SSDEEP
12288:0uyDa1a8LreR/xtM3HC55WmpYshXZPbGwidNpgPTm:0ja1a2eR/c3HC55WmD9idNpga
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-