General
-
Target
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.bin
-
Size
760KB
-
Sample
240701-1yattswepk
-
MD5
dd706709ea5959156286c83460828486
-
SHA1
799d80c6b7a6838c489f571c27643779d7c320f8
-
SHA256
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108
-
SHA512
7f1255bc402cad39ab424096397064b8c7bc1ddfe9b74a13af588338aaff647298ce4c72ce272cd617ed34b47791e8bd3de4284a4ca58d2a8e05a477091db9c5
-
SSDEEP
12288:5MJWpQa1a8LreAzetCUzn5WmpYshXZPbGwidNpgb:SJ1a1a2eAqCUzn5WmD9idNpo
Behavioral task
behavioral1
Sample
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
currently-judges.gl.at.ply.gg:33065
Targets
-
-
Target
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108.bin
-
Size
760KB
-
MD5
dd706709ea5959156286c83460828486
-
SHA1
799d80c6b7a6838c489f571c27643779d7c320f8
-
SHA256
c63aacac39a466e3158ad3de3a4a7a0f05a1f57932f5d3f21ec375e0e8c62108
-
SHA512
7f1255bc402cad39ab424096397064b8c7bc1ddfe9b74a13af588338aaff647298ce4c72ce272cd617ed34b47791e8bd3de4284a4ca58d2a8e05a477091db9c5
-
SSDEEP
12288:5MJWpQa1a8LreAzetCUzn5WmpYshXZPbGwidNpgb:SJ1a1a2eAqCUzn5WmD9idNpo
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-