General
-
Target
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.bin
-
Size
760KB
-
Sample
250220-1wwnhsxqz7
-
MD5
e4f204a48558988e9971beeee98b2e44
-
SHA1
463b315ec2becf20458f876cc99992947b2cd365
-
SHA256
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd
-
SHA512
8f0165fcf37af5b32ea6a6695e530f40604b29fc27e705a2ad81f64191a0f28e6373365c3f6771144a6df7291b636014fff7a093c1b1ff902852f315e8287aa4
-
SSDEEP
12288:uHgv+da1a8LreMzmT+ZXT5WmpYshXZPbGwidNpg5W:uHg6a1a2eMk+ZXT5WmD9idNp/
Behavioral task
behavioral1
Sample
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
comes-sticker.gl.at.ply.gg:7499
Targets
-
-
Target
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd.bin
-
Size
760KB
-
MD5
e4f204a48558988e9971beeee98b2e44
-
SHA1
463b315ec2becf20458f876cc99992947b2cd365
-
SHA256
1cfce31d8f2794a70ca8f564f2c458e3b84b730238269b748a840ca1ef2a76cd
-
SHA512
8f0165fcf37af5b32ea6a6695e530f40604b29fc27e705a2ad81f64191a0f28e6373365c3f6771144a6df7291b636014fff7a093c1b1ff902852f315e8287aa4
-
SSDEEP
12288:uHgv+da1a8LreMzmT+ZXT5WmpYshXZPbGwidNpg5W:uHg6a1a2eMk+ZXT5WmD9idNp/
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-