General
-
Target
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.bin
-
Size
760KB
-
Sample
250402-115rzsxky4
-
MD5
da92668834d7f2f98345cb0e6f36e6a7
-
SHA1
b79e8547ca99a324fbbcbc597ba8fb36d691fe44
-
SHA256
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d
-
SHA512
a9af147f7ec2a0a00c93727a478b215d95eef0acf7f9ffd9370eaa363e143fc58ce8bb2870c30636fcff9f6f8fceeff7970ed015f4eb3172944c4f5cb84cbfaf
-
SSDEEP
12288:dbVUSba1a8Ldey/UHAjRd5WmpYshXZPbGwidNpg/p9I:dza1a6ey6AjRd5WmD9idNpn
Behavioral task
behavioral1
Sample
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
total-enclosure.gl.at.ply.gg:15954
Targets
-
-
Target
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d.bin
-
Size
760KB
-
MD5
da92668834d7f2f98345cb0e6f36e6a7
-
SHA1
b79e8547ca99a324fbbcbc597ba8fb36d691fe44
-
SHA256
a39d9af80e1dd50ae4ff5d25f9eed2b2ff7c8eb2410a7d190eceef2b8f4c2b5d
-
SHA512
a9af147f7ec2a0a00c93727a478b215d95eef0acf7f9ffd9370eaa363e143fc58ce8bb2870c30636fcff9f6f8fceeff7970ed015f4eb3172944c4f5cb84cbfaf
-
SSDEEP
12288:dbVUSba1a8Ldey/UHAjRd5WmpYshXZPbGwidNpg/p9I:dza1a6ey6AjRd5WmD9idNpn
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-