General

  • Target

    ready.apk

  • Size

    8.5MB

  • Sample

    231227-q223daeah5

  • MD5

    c4b8254716ab9f28e12d915d3ff64890

  • SHA1

    432532e600755bc13dac03938b66bf0c4c036e5c

  • SHA256

    08f2ee6a34940cf515246fc8257650e12291c85443544501947b403fd2910023

  • SHA512

    12a5428864c6ecdf8ec6731f96d9f9c9141d19eae8dac6f8c406fc3130dcf4ec5828af0ff4416064cfcdd2991421fa04c400bb3749174227b9911cd97fe39538

  • SSDEEP

    49152:dsEV6NAjioO6G0PmXrtt5WTwH5EGveaVEmzYzdGGNQTOBFUJYqr0cgwGRk:2XUioNebtvXKGvqmzYzBCTZ0twd

Score
10/10

Malware Config

Extracted

Family

spynote

C2

35.180.62.111:7771

Targets

    • Target

      ready.apk

    • Size

      8.5MB

    • MD5

      c4b8254716ab9f28e12d915d3ff64890

    • SHA1

      432532e600755bc13dac03938b66bf0c4c036e5c

    • SHA256

      08f2ee6a34940cf515246fc8257650e12291c85443544501947b403fd2910023

    • SHA512

      12a5428864c6ecdf8ec6731f96d9f9c9141d19eae8dac6f8c406fc3130dcf4ec5828af0ff4416064cfcdd2991421fa04c400bb3749174227b9911cd97fe39538

    • SSDEEP

      49152:dsEV6NAjioO6G0PmXrtt5WTwH5EGveaVEmzYzdGGNQTOBFUJYqr0cgwGRk:2XUioNebtvXKGvqmzYzBCTZ0twd

    Score
    8/10
    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Tries to add a device administrator.

    • Acquires the wake lock

MITRE ATT&CK Matrix

Tasks