Analysis
-
max time kernel
180s -
max time network
189s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21-05-2024 05:25
Static task
static1
Behavioral task
behavioral1
Sample
upgrade.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
upgrade.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
upgrade.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
childapp.apk
-
Size
3.1MB
-
MD5
2b499c1a64c45ce2959eb18fe64b2a6c
-
SHA1
0466e8938274b0c7c20c10c462452f6669dbd559
-
SHA256
38f104e1ebe425c3c3d00fc4e7d0e516173cf3ffb0774031514fc1b8ed6f212d
-
SHA512
c80c58bbb68e65694e45a7914b2f7687eb91c58a9f0bcaffc1eaeda4c358fe82e7201d11178b27da17df63d83c72e41faed08439690de256f2533e0e4702a6c8
-
SSDEEP
49152:EqjG1eSMlFIOW2B/pQYqjA8gAI0O2Aw/moHNebj+V+iKZtl8cPBuI3FS:EqCzMk2tq2307jebDiK3l8ML4
Malware Config
Extracted
spynote
chutiyahaitu.duckdns.org:chutiyahaitu.duckdns.org:8080:8080
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.appser.verappdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.appser.verapp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.appser.verapp -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.appser.verappdescription ioc process File opened for read /proc/cpuinfo com.appser.verapp -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.appser.verappdescription ioc process File opened for read /proc/meminfo com.appser.verapp -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.appser.verappioc pid process /data/user/0/com.appser.verapp/app_ded/4OvCgj16GI4EciCgW9ki6UYfjKlP9oBl.dex 4499 com.appser.verapp /data/user/0/com.appser.verapp/app_ded/4OvCgj16GI4EciCgW9ki6UYfjKlP9oBl.dex 4499 com.appser.verapp -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.appser.verappdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.appser.verapp -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.appser.verappdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.appser.verapp -
Acquires the wake lock 1 IoCs
Processes:
com.appser.verappdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.appser.verapp -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.appser.verappdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.appser.verapp -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.appser.verappdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.appser.verapp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.appser.verappdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.appser.verapp
Processes
-
com.appser.verapp1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4499
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1014KB
MD52e79475388ed68de19874e8642e2e889
SHA1073bc6e1e797fda6bf7ba0cb214784449d628016
SHA256e10fc5943cb761acee08addfc1fa8f0a2124b04013462a1a8705cda66fded91f
SHA51230381f7bab66304387612cb599f8d78cd43af180efe879485f2607f238740724ea6e884ba5f277730e8920378c8e8d9f8cd208f1c74840231a5a9caaf8dea430
-
Filesize
52B
MD5672fb66d48cbf8e9ba20841df68e5a7a
SHA1867e0e7181d23b849a4186b0ed1c89268040934c
SHA256d492658e77fa94e642d051f1326ebab86225c71eaa8f4b3dc124a19333114c4e
SHA512323cadd8d3c48a924c3b51a98b37af1b53d5d00de0970d69cd1281bbc192a37f05142bbbf56dacef57401754332bf694110097eaffee66d1b33a19f2e8499888
-
Filesize
283B
MD5494b261a53c279b6df8f016f074c7260
SHA1ed88aa75b0cf8f53a9edd53f0cd8e3c6425b12c6
SHA256c1e90db2a6b9dadcb1a68b54466bcd22ed27f026df0c2e5d42314636c98d64ea
SHA512104a53f5776dd97f8a3f1c493825644a69c8d439cc841ed577ec538901e9501ab232841844ae6a7f67a730fcf6b896be5eaabd5de3f9b462d20b8dd3aa139b02
-
Filesize
28B
MD5b526759c1c5f32d1e480f73d98684568
SHA1205b4553d10be5cabdfca65e5461d427b656546d
SHA256891362c5fb40d06ac17d0df709f7ddd1984669e7a4a0528b5ad2fdab483a30d4
SHA51263187d02028571c51ade3468a429a987b5d3d5b811b4b5a8bc82a82af8fa8160eadc973398cf4a5e27dec925e288f8528a4e795119a49b532cd60f265b777c07