Analysis

  • max time kernel
    175s
  • max time network
    131s
  • platform
    android_x86
  • resource
    android-x86-arm-20240514-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system
  • submitted
    26-05-2024 01:12

General

  • Target

    d8fa3466ff6f11a060ad6dff7e0c9c2e13935236eeafe265be650c7139b0b490.apk

  • Size

    4.8MB

  • MD5

    92df3770e6426013880eb177389f27f3

  • SHA1

    75963009c8fa3f45dc91e1b266afb10c6592e71a

  • SHA256

    d8fa3466ff6f11a060ad6dff7e0c9c2e13935236eeafe265be650c7139b0b490

  • SHA512

    c9263342a88243b565e8f4d105b4576c142d5c64f8f7ea09669cae50b521a3c70bcde0f49f9c5fa02f5a4d61e6b072e4352ebf20e2a4a1aa98b7a572b3ac39db

  • SSDEEP

    98304:RwWhXdj89TdS4UvZhCyLvxgYNykcYv5oAVj6yhu4hgjKrlSWqpqo7al5M5+14b3/:WW9F89TdHUOyLvxgNkX1BhbhCKIvAV1M

Malware Config

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Spynote payload 2 IoCs
  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.miui.tencent.security
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4279
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.miui.tencent.security/app_ded/3QL3nUK1TWvNfBeGj1DNNsSoojbSgP2y.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.miui.tencent.security/app_ded/oat/x86/3QL3nUK1TWvNfBeGj1DNNsSoojbSgP2y.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4306

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.miui.tencent.security/app_ded/3QL3nUK1TWvNfBeGj1DNNsSoojbSgP2y.dex
    Filesize

    572KB

    MD5

    723f465939d7ea8f23c82e4c590d8efa

    SHA1

    9e6ff456ef587af71b89fae3e9d05717f77144bc

    SHA256

    38a023f21bb7e4d95c5d100ab63ff3598f5d6dca2bd12c48120150fa18917614

    SHA512

    f2c1538409e357c464b723a56b7f24650a231d34e59f286bd85a1a209129c1662f9ac6d19ad101f9fe16a16fc910602850d0f66f85fb9101cd5dcde1539090c0

  • /data/user/0/com.miui.tencent.security/app_ded/3QL3nUK1TWvNfBeGj1DNNsSoojbSgP2y.dex
    Filesize

    572KB

    MD5

    05bcf67aebb42c36319fca954665ff3d

    SHA1

    2fac23128fc7e7c8545968448d93fc6cc75a188c

    SHA256

    e250a0489a1bd8e799a3f540ed5877b7fef910cb99d4da76534661bf2f51f4c6

    SHA512

    c170e77a0f51244bb0a7d0ef64c708460b9cfe1e8851dae22e80fe6b75394f7a2598ea7fe17490c047e77baeb68024ec97a5b622b987027d3599778ee4c2e06c