Resubmissions

12/06/2024, 22:56

240612-2wnhksxgjl 10

12/06/2024, 22:48

240612-2rhfrstend 10

General

  • Target

    ready.apk

  • Size

    10.2MB

  • Sample

    240612-2rhfrstend

  • MD5

    407b337fb7b95765621f4e2b4058e8ff

  • SHA1

    71dd5b02c2ca314b59081f94e11bfd40dcfdf2bc

  • SHA256

    4283e2c75f475cca86c1449059700a0bb0a7b1f9aa5b5316b738a5dde6b0cfbb

  • SHA512

    14a961f20752792bf8e517acf7b220cc31926b614dbeea5c465352be45aba677873a8cf6393c28e74314d0dc13f8dab4aa39bcebd4e51b754bec547ac1cd5864

  • SSDEEP

    98304:9XePd4pN+t01ojaah+tPWJt5uY52KtqOOAPymz/zBXTl0tYKI5Za:9XePd4+/jth+t+JV8KtUAP9zN6boa

Malware Config

Extracted

Family

spynote

C2

regional-mechanical.gl.at.ply.gg:19194

Targets

    • Target

      ready.apk

    • Size

      10.2MB

    • MD5

      407b337fb7b95765621f4e2b4058e8ff

    • SHA1

      71dd5b02c2ca314b59081f94e11bfd40dcfdf2bc

    • SHA256

      4283e2c75f475cca86c1449059700a0bb0a7b1f9aa5b5316b738a5dde6b0cfbb

    • SHA512

      14a961f20752792bf8e517acf7b220cc31926b614dbeea5c465352be45aba677873a8cf6393c28e74314d0dc13f8dab4aa39bcebd4e51b754bec547ac1cd5864

    • SSDEEP

      98304:9XePd4pN+t01ojaah+tPWJt5uY52KtqOOAPymz/zBXTl0tYKI5Za:9XePd4+/jth+t+JV8KtUAP9zN6boa

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks