Resubmissions

11-02-2024 10:04

240211-l3z7ysha73 10

11-02-2024 10:03

240211-l3mlvsfa51 10

10-02-2024 22:02

240210-1xscgshb9s 10

Analysis

  • max time kernel
    4s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    10-02-2024 22:02

General

  • Target

    17b37cf7db4b20774fce174e0ae6ed09f773d2a634ad3652dffdca7b59938742.apk

  • Size

    1.5MB

  • MD5

    dd7939e39f76083ba62bf11eda3fc815

  • SHA1

    a9f3b9d47d7c7a3862fb824840ccaee64092c5d7

  • SHA256

    17b37cf7db4b20774fce174e0ae6ed09f773d2a634ad3652dffdca7b59938742

  • SHA512

    0026c2bab2a6acad3cc2508a36280222f6d4a106a7f329edc3fdc4af6eb2314b30df6f4da9e0eb49b033bacdd874df941a2bac01d8e1a9b66cfe190254cf7002

  • SSDEEP

    24576:wAwcDF6sHhInia1amebYNp2k5WmD9idNpPaVL0aaDnG5Zy:acDFknia1aXetWk0d/PQLgn4Zy

Malware Config

Extracted

Family

spynote

C2

googlechrome.myftp.org:5214

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Spynote payload 1 IoCs
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 18 IoCs

Processes

  • com.eset.ems2.gp
    1⤵
      PID:5055

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /storage/emulated/0/null/base.apk
      Filesize

      49KB

      MD5

      d2b416f20bfeded69f5e907db3715964

      SHA1

      dab142602a53deb51a510f2b7eb503fcdc300050

      SHA256

      b2094e364773bde6a2ee605376c06385ac42afcee362c66cb01fc2b4e7689acd

      SHA512

      f37035c228507a29a82d08bad33a8952a5a6945198614381d07fa4ab7bac313efd7dd282ea846aa7d15c275e875a734ef001fb4a5c4ed0bbe64f2aad1454c73e