General
-
Target
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.bin
-
Size
760KB
-
Sample
250220-1wvq8awlat
-
MD5
3f510a63bf96423f1e8f388448bba010
-
SHA1
b7280206684a54b55dd31c55f3972a51aaa885dd
-
SHA256
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48
-
SHA512
d300c78ba42e1e192646e6d8f5d009c295644e3ee5e8060f1c6d29ff6400e0e9b69d574df5c4447fd2ba4ecc6d17192d9a1cdfa4ab71afffde092e59d23fd0df
-
SSDEEP
12288:BeLCtHa1a8LVe7XPrX4IK5WmpYshXZPbGwidNpgYl2:BeLsa1aKe7zX4IK5WmD9idNpM
Behavioral task
behavioral1
Sample
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
25.ip.gl.ply.gg:51065
Targets
-
-
Target
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48.bin
-
Size
760KB
-
MD5
3f510a63bf96423f1e8f388448bba010
-
SHA1
b7280206684a54b55dd31c55f3972a51aaa885dd
-
SHA256
0d40ca8e68cfde38072200bbb58d63276640d3eef69a6d2d7c25e586c48ffd48
-
SHA512
d300c78ba42e1e192646e6d8f5d009c295644e3ee5e8060f1c6d29ff6400e0e9b69d574df5c4447fd2ba4ecc6d17192d9a1cdfa4ab71afffde092e59d23fd0df
-
SSDEEP
12288:BeLCtHa1a8LVe7XPrX4IK5WmpYshXZPbGwidNpgYl2:BeLsa1aKe7zX4IK5WmD9idNpM
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-