General

  • Target

    ready.apk

  • Size

    18.7MB

  • Sample

    230914-vyym1adf3y

  • MD5

    942eaee0e8e661a6009ea5aea34df079

  • SHA1

    f8839b43660f82600ca537840dbc8fcc4b889127

  • SHA256

    ac2002f54c39189f4d3ada38fb8223c96da326a177e7596a3fb8bd8c1bb6a552

  • SHA512

    6273f8594ebe64ce69223c7331223751511aa00283d2f8fb40d3a37c7e596398524334a0e55b65f53fb132f6500cd777b6ef744f2d26e3a447cfb6ad61f1d1ab

  • SSDEEP

    393216:4QPNYrg0Ogvm4gc7qEsv8l2t0+20U451oL:4QSrg1gvm431sv8e0+G4f0

Malware Config

Extracted

Family

spynote

C2

fee-harmful.gl.at.ply.gg:41934

Targets

    • Target

      ready.apk

    • Size

      18.7MB

    • MD5

      942eaee0e8e661a6009ea5aea34df079

    • SHA1

      f8839b43660f82600ca537840dbc8fcc4b889127

    • SHA256

      ac2002f54c39189f4d3ada38fb8223c96da326a177e7596a3fb8bd8c1bb6a552

    • SHA512

      6273f8594ebe64ce69223c7331223751511aa00283d2f8fb40d3a37c7e596398524334a0e55b65f53fb132f6500cd777b6ef744f2d26e3a447cfb6ad61f1d1ab

    • SSDEEP

      393216:4QPNYrg0Ogvm4gc7qEsv8l2t0+20U451oL:4QSrg1gvm431sv8e0+G4f0

    Score
    8/10
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks