General

  • Target

    Youtube Bypass.apk

  • Size

    3.7MB

  • Sample

    230914-bzvsysbc45

  • MD5

    d75f3814bbc3ff314f080df024fc53d9

  • SHA1

    83da2cf64b39491e0f19fe6993f708f2f6bfdd1b

  • SHA256

    c7568d7b54a0be47351e3f70952ad64599e8a5faf644b8284f4890c2fa5c1729

  • SHA512

    066963f319fe520e4f0bcfd7c9429a110215262501f5471da17ccb5fc39e5b3c4dcd460e80591084686b8dd5cc3cf053674bc999884c0cf65c5f2d8257dad9eb

  • SSDEEP

    49152:JisbmhRsC5vj9yHZY9F5A45mMsqmzDzdGGMQTOV7UjYqh0cg8EVuik1jk:JisbwsC5oq9F52dqmzDzBrTf0t8EmI

Malware Config

Extracted

Family

spynote

C2

fee-harmful.gl.at.ply.gg:41934

Targets

    • Target

      Youtube Bypass.apk

    • Size

      3.7MB

    • MD5

      d75f3814bbc3ff314f080df024fc53d9

    • SHA1

      83da2cf64b39491e0f19fe6993f708f2f6bfdd1b

    • SHA256

      c7568d7b54a0be47351e3f70952ad64599e8a5faf644b8284f4890c2fa5c1729

    • SHA512

      066963f319fe520e4f0bcfd7c9429a110215262501f5471da17ccb5fc39e5b3c4dcd460e80591084686b8dd5cc3cf053674bc999884c0cf65c5f2d8257dad9eb

    • SSDEEP

      49152:JisbmhRsC5vj9yHZY9F5A45mMsqmzDzdGGMQTOV7UjYqh0cg8EVuik1jk:JisbwsC5oq9F52dqmzDzBrTf0t8EmI

    Score
    8/10
    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks