General
-
Target
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e.bin
-
Size
747KB
-
Sample
250403-1y1p9axns4
-
MD5
9e540af54cfc1e9b86d08f1cb1bdc388
-
SHA1
7b34ee137eca62826568abf27a2a9adbe9ed603f
-
SHA256
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e
-
SHA512
2111bfe7c247a0544c403dac84a23861ea8f63961801920ebec36586a74ae90215b8944934d6c2231af053b4cd4033a4566a49da04a770c7009ed2f05aee428a
-
SSDEEP
12288:AtdTJ6sgRwLzgh7Mk55po5WmpYshXZPbGwidNpgSd:y5J6sbLzEAkfpo5WmD9idNp9
Behavioral task
behavioral1
Sample
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
j-sic.gl.at.ply.gg:7583
Targets
-
-
Target
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e.bin
-
Size
747KB
-
MD5
9e540af54cfc1e9b86d08f1cb1bdc388
-
SHA1
7b34ee137eca62826568abf27a2a9adbe9ed603f
-
SHA256
c9f38383f9650157e2813cbb94b306c9ac8f2c9653fb7984c0dbe8504ec35c2e
-
SHA512
2111bfe7c247a0544c403dac84a23861ea8f63961801920ebec36586a74ae90215b8944934d6c2231af053b4cd4033a4566a49da04a770c7009ed2f05aee428a
-
SSDEEP
12288:AtdTJ6sgRwLzgh7Mk55po5WmpYshXZPbGwidNpgSd:y5J6sbLzEAkfpo5WmD9idNp9
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-