Malware Analysis Report

2025-01-23 12:46

Sample ID 230606-l5tsysdf5x
Target client.apk
SHA256 99ad42b14a9da88c3997ed401f86ff31eab62da601ec95bf67bde0cb937f1e72
Tags
spynote banker
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

99ad42b14a9da88c3997ed401f86ff31eab62da601ec95bf67bde0cb937f1e72

Threat Level: Known bad

The file client.apk was found to be: Known bad.

Malicious Activity Summary

spynote banker

Spynote family

Spynote payload

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-06-06 10:07

Signatures

Spynote family

spynote

Spynote payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write (but not read) the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-06-06 10:07

Reported

2023-06-06 10:10

Platform

android-x86-arm-20220823-en

Max time kernel

2419036s

Max time network

151s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Processes

cmf0.c3b5bm90zq.patch

su

su

su

Network

Country Destination Domain Proto
NL 216.58.214.14:443 udp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.208.110:443 android.apis.google.com tcp
GB 216.58.208.110:443 android.apis.google.com tcp
GB 216.58.208.110:443 android.apis.google.com tcp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
US 1.1.1.1:853 tcp
NL 142.250.179.162:443 tcp

Files

/storage/emulated/0/FREE ROBUX/config06-06-2023.log

MD5 116377b8fad7cbd517ab5e4e3ac8d871
SHA1 9108dea17ffb55b7bc4be38cb948a0739b10ce7f
SHA256 f868a79f13a8f07eab73f0d227df89703593a50e59225430702861a0fdcc69a5
SHA512 aa5376c00cc44d473920bae599c6bfb9630b4e79fac8b581fe54c72a57a463c6e15e3e896f9db1d55b7df38594eeabb37daf23a14f1842995de1c3b8c6a02d38

Analysis: behavioral2

Detonation Overview

Submitted

2023-06-06 10:07

Reported

2023-06-06 10:10

Platform

android-x64-20220823-en

Max time kernel

2418898s

Max time network

158s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

N/A

Processes

cmf0.c3b5bm90zq.patch

su

su

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 g.tenor.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 android.apis.google.com udp
DE 172.217.23.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
DE 172.217.23.200:443 ssl.google-analytics.com tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2023-06-06 10:07

Reported

2023-06-06 10:10

Platform

android-x64-arm64-20220823-en

Max time kernel

2419036s

Max time network

157s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

banker
Description Indicator Process Target
Framework service call android.content.pm.IPackageManager.getInstalledApplications N/A N/A

Processes

cmf0.c3b5bm90zq.patch

su

su

Network

Country Destination Domain Proto
US 1.1.1.1:53 growth-pa.googleapis.com udp
N/A 224.0.0.251:5353 udp
GB 216.58.208.110:443 tcp
GB 216.58.208.110:443 tcp
GB 216.58.208.110:443 tcp
GB 216.58.208.110:443 tcp
NL 142.251.39.106:443 udp
NL 142.251.39.106:443 tcp
US 1.1.1.1:53 infinitedata-pa.googleapis.com udp
NL 142.250.179.170:443 infinitedata-pa.googleapis.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 android.apis.google.com udp
DE 172.217.23.206:443 android.apis.google.com tcp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
NL 172.217.168.205:443 accounts.google.com tcp
US 1.1.1.1:53 bcyhybgtstnotao udp
US 1.1.1.1:53 rvcxslhzcyv udp
US 1.1.1.1:53 xzcfxjf udp
US 1.1.1.1:53 bcyhybgtstnotao udp
US 1.1.1.1:53 rvcxslhzcyv udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 update.googleapis.com udp
US 1.1.1.1:53 play.google.com udp
NL 142.250.179.206:443 play.google.com tcp
NL 142.250.179.206:443 play.google.com tcp
US 1.1.1.1:53 update.googleapis.com udp
NL 142.250.179.131:443 update.googleapis.com tcp
US 1.1.1.1:53 edgedl.me.gvt1.com udp
US 34.104.35.123:80 edgedl.me.gvt1.com tcp

Files

/storage/emulated/0/FREE ROBUX/config06-06-2023.log

MD5 116377b8fad7cbd517ab5e4e3ac8d871
SHA1 9108dea17ffb55b7bc4be38cb948a0739b10ce7f
SHA256 f868a79f13a8f07eab73f0d227df89703593a50e59225430702861a0fdcc69a5
SHA512 aa5376c00cc44d473920bae599c6bfb9630b4e79fac8b581fe54c72a57a463c6e15e3e896f9db1d55b7df38594eeabb37daf23a14f1842995de1c3b8c6a02d38