General
-
Target
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.bin
-
Size
853KB
-
Sample
250401-1yjrqsw1ds
-
MD5
87a848474afdba18cda4439b726b3d43
-
SHA1
b42772efc4765972ed8602c1c5325ac05fce2c70
-
SHA256
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff
-
SHA512
081d902f29b35abfd8144f200ce6dd7b4ffd9ea2a661112a418d0461f083dab00b9a026cfd264cef6917a978150c4a0ae60a8cdfac0ce2be7fda48ef4050f7fb
-
SSDEEP
12288:7Svk7hZva1a8Lze54yYc8hu7dds1KyS5WmpYshXZPbGwidNpg2:+vk7zva1ame5lYhhEM1KyS5WmD9idNp5
Behavioral task
behavioral1
Sample
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
famatec840-20359.portmap.host:20359
Targets
-
-
Target
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff.bin
-
Size
853KB
-
MD5
87a848474afdba18cda4439b726b3d43
-
SHA1
b42772efc4765972ed8602c1c5325ac05fce2c70
-
SHA256
f4f454c14502397744a800b34ccfe611f2662f500ad5af60c8b12fcfdc1442ff
-
SHA512
081d902f29b35abfd8144f200ce6dd7b4ffd9ea2a661112a418d0461f083dab00b9a026cfd264cef6917a978150c4a0ae60a8cdfac0ce2be7fda48ef4050f7fb
-
SSDEEP
12288:7Svk7hZva1a8Lze54yYc8hu7dds1KyS5WmpYshXZPbGwidNpg2:+vk7zva1ame5lYhhEM1KyS5WmD9idNp5
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-