General
-
Target
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.bin
-
Size
766KB
-
Sample
240702-1ytlyawdkn
-
MD5
50d0afe092139c378447a243ed83b878
-
SHA1
80e21c68e80ca94a5045bbcca63b6b5422047821
-
SHA256
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325
-
SHA512
4e75a5d9b724f50ac177c8872f41208dccaf3c253ccb7e6551ed97f34f400a5ef8646c5ac0330a39909b937536c925678e18cb4f2a97e496330dedfd80e89660
-
SSDEEP
12288:R85azD3Ea1a8LVegI3KasXf25WmpYshXZPbGwidNpgW:/D0a1aKegI6agf25WmD9idNpt
Behavioral task
behavioral1
Sample
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
363c-91-185-79-14.ngrok-free:9595
Targets
-
-
Target
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325.bin
-
Size
766KB
-
MD5
50d0afe092139c378447a243ed83b878
-
SHA1
80e21c68e80ca94a5045bbcca63b6b5422047821
-
SHA256
4fb54281bfd6e6440f9f8a8bbd8f2dccace8e93e8cd77826384d899b42373325
-
SHA512
4e75a5d9b724f50ac177c8872f41208dccaf3c253ccb7e6551ed97f34f400a5ef8646c5ac0330a39909b937536c925678e18cb4f2a97e496330dedfd80e89660
-
SSDEEP
12288:R85azD3Ea1a8LVegI3KasXf25WmpYshXZPbGwidNpgW:/D0a1aKegI6agf25WmD9idNpt
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests enabling of the accessibility settings.
-
Tries to add a device administrator.
-