General
-
Target
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.bin
-
Size
760KB
-
Sample
250328-1xkbwassft
-
MD5
cdb30e9543bd02cc82eb1ce975f7a206
-
SHA1
0e6fa76a1369b4fc858a940b19ab2767b76c3050
-
SHA256
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f
-
SHA512
ce3648a822d7795b75e0ab592106c4e02594b1deb7497041fb87d7dbb1aacf20bfeec58ae1a890bf789ab523e6f46307d403366b25952d9984120b8508543766
-
SSDEEP
12288:rxJK8/J6sgRALzyfIjYRlR5WmpYshXZPbGwidNpgbrE:rxH/J6sjLzy2YRlR5WmD9idNpL
Behavioral task
behavioral1
Sample
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
20.ip.gl.ply.gg:23503
Targets
-
-
Target
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f.bin
-
Size
760KB
-
MD5
cdb30e9543bd02cc82eb1ce975f7a206
-
SHA1
0e6fa76a1369b4fc858a940b19ab2767b76c3050
-
SHA256
7298a97a554a1d6a5e7a78a0099c1a7551877dd29e2b1e8928113769ffc0e01f
-
SHA512
ce3648a822d7795b75e0ab592106c4e02594b1deb7497041fb87d7dbb1aacf20bfeec58ae1a890bf789ab523e6f46307d403366b25952d9984120b8508543766
-
SSDEEP
12288:rxJK8/J6sgRALzyfIjYRlR5WmpYshXZPbGwidNpgbrE:rxH/J6sjLzy2YRlR5WmD9idNpL
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-