General
-
Target
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.bin
-
Size
760KB
-
Sample
250403-14k7ravxe1
-
MD5
3972db855225d8d482d40600debaf5a7
-
SHA1
5925dd0c66359bf0b892893a9d201016f1fb2d4b
-
SHA256
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe
-
SHA512
e23a3243afcc2f5fc957db1b3a0b5244a6758c939175e86b6fae5b452c5074fa286e78249ecfa70c1a011c50344f39460c1244d00750e96b51946dc7762e2594
-
SSDEEP
12288:ZxA0a1a8Lze2HE3YG7ipl5WmpYshXZPbGwidNpgwUN:Z/a1ame2qYMipl5WmD9idNp+N
Behavioral task
behavioral1
Sample
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
spring-plasma.gl.at.ply.gg:7331
Targets
-
-
Target
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe.bin
-
Size
760KB
-
MD5
3972db855225d8d482d40600debaf5a7
-
SHA1
5925dd0c66359bf0b892893a9d201016f1fb2d4b
-
SHA256
d19825d7f50a54aee04cfdbd65514c174f829312b84c5163fb8d3cf9ef261bbe
-
SHA512
e23a3243afcc2f5fc957db1b3a0b5244a6758c939175e86b6fae5b452c5074fa286e78249ecfa70c1a011c50344f39460c1244d00750e96b51946dc7762e2594
-
SSDEEP
12288:ZxA0a1a8Lze2HE3YG7ipl5WmpYshXZPbGwidNpgwUN:Z/a1ame2qYMipl5WmD9idNp+N
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-