General
-
Target
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.bin
-
Size
760KB
-
Sample
250331-1ynqpayxby
-
MD5
81f9472c1e95adc6536c30af2ea373fb
-
SHA1
9be36cb6aa0fc5fbd5b74e054c11d4e7f00882c0
-
SHA256
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086
-
SHA512
fa6c61d7b5a2ba4c758ee94c853843f29fb092bae4ad5025fe18ac1f559221fbff7a89b55f682587c4225f0eeb66a15fc566bbe730550479a878414424e8f90f
-
SSDEEP
12288:6AJsa1a8LzeYjWlKTrf5WmpYshXZPbGwidNpgx:6A2a1ameY6KTrf5WmD9idNpa
Behavioral task
behavioral1
Sample
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
192.168.1.72:2225
Targets
-
-
Target
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086.bin
-
Size
760KB
-
MD5
81f9472c1e95adc6536c30af2ea373fb
-
SHA1
9be36cb6aa0fc5fbd5b74e054c11d4e7f00882c0
-
SHA256
77d9f0a2b5fb4acfc3e0f24c329119873d7ba58d1ad53d891ab8185816c0d086
-
SHA512
fa6c61d7b5a2ba4c758ee94c853843f29fb092bae4ad5025fe18ac1f559221fbff7a89b55f682587c4225f0eeb66a15fc566bbe730550479a878414424e8f90f
-
SSDEEP
12288:6AJsa1a8LzeYjWlKTrf5WmpYshXZPbGwidNpgx:6A2a1ameY6KTrf5WmD9idNpa
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-