Resubmissions

General

  • Target

    ready.apk

  • Size

    6.2MB

  • Sample

    240413-t2r4yseh44

  • MD5

    5179baf91fcb305c263ee95285ec265c

  • SHA1

    c9e16e18d7f95ab0060cb66de581b861beee7610

  • SHA256

    eed6d544a4aa129bdf6e419951d0d1c24970c6459dd823407a6c330b551450de

  • SHA512

    3c11511c828e2234b96cb722d9593a9c68b76c0826fdc148b5f8bffff283382e3f0bf01efa023a77ee36d7b6f50f471fd16cc9e74d8c96567aa7c103f2574fa8

  • SSDEEP

    24576:8Bn5mosduBj/81BgZSMP9D+SS+u8gGGDWunvZLkbLWR+L:8eos4/87oSMpVDngG/AvZ94

Malware Config

Extracted

Family

spynote

C2

fr1.localto.net:45451

Targets

    • Target

      ready.apk

    • Size

      6.2MB

    • MD5

      5179baf91fcb305c263ee95285ec265c

    • SHA1

      c9e16e18d7f95ab0060cb66de581b861beee7610

    • SHA256

      eed6d544a4aa129bdf6e419951d0d1c24970c6459dd823407a6c330b551450de

    • SHA512

      3c11511c828e2234b96cb722d9593a9c68b76c0826fdc148b5f8bffff283382e3f0bf01efa023a77ee36d7b6f50f471fd16cc9e74d8c96567aa7c103f2574fa8

    • SSDEEP

      24576:8Bn5mosduBj/81BgZSMP9D+SS+u8gGGDWunvZLkbLWR+L:8eos4/87oSMpVDngG/AvZ94

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks