Analysis
-
max time kernel
179s -
max time network
183s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
17/06/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
Temp_20Mail.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral2
Sample
Temp_20Mail.apk
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
Temp_20Mail.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
Temp_20Mail.apk
-
Size
3.0MB
-
MD5
0870496d78aa5b59ad57e914c1d5f6b0
-
SHA1
5b9bfa06d05172f61d1ee19724fcd12cec110353
-
SHA256
07346cf8ba8cba881250023326382b88dcf4247cfa64501ccc560667614a7297
-
SHA512
7d6fa2a95a198d9486fe924d1098d6761d6b36df4c76db502c6a6cc7123621449711e394d6a61a2024bf8e85b556c391e58354d02f03bb9d7ab710ebeba81876
-
SSDEEP
49152:xcueXk4qYTmiO+KyYWWLPke4H0F7ZbS8ULmc/hcRGU3DrZb:eue5NO4YuUzXUac/WRGU3DVb
Malware Config
Extracted
spynote
156.245.20.17:7771
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin 4290 updates.teens.sa /data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin 4350 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/updates.teens.sa/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin 4290 updates.teens.sa -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId updates.teens.sa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText updates.teens.sa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId updates.teens.sa -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock updates.teens.sa -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground updates.teens.sa -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo updates.teens.sa -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone updates.teens.sa -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS updates.teens.sa -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver updates.teens.sa -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule updates.teens.sa -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo updates.teens.sa -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo updates.teens.sa
Processes
-
updates.teens.sa1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4290 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/updates.teens.sa/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4350
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD550c6d6acf87e5fc31279bbcab6e658d2
SHA13277812d5668f83f4d0f0da6a271d4b77846779e
SHA25695cd7ea94c69d01216dfea9a1b5a6122d5c8ed7bf8c1baf7c37d069c5c4ca671
SHA5126817015f04e265f9cb7d2d5982d942d54ea5aaa1a4bb0a53d580ba4749b416608c150e5063e13ed8ae576607053e25c2f6838a0bffe3449782775ffc39676e41
-
Filesize
4.0MB
MD5f52252ff399ae534b767a210d25b92be
SHA1a1f47b82bf11c4b332ab0ca6f6e39d32d47c554c
SHA256e0ccabe4ac76532c2637cedc85435a70a1784d5c3b2eeb5aaef559ccc27601ec
SHA512f76382cc01cdaa06e56794f6aca1378849568a37a83c6e1af60ec0e6b77e14d512a7d7b22da880543c9a9471e0cbcb9ee9ab092a54e3c2d571e57880e60f23ca
-
Filesize
280B
MD5024a9da72245fdef4cdec42365b28106
SHA1a59ccd63f10c619cbe7c744ef5ad3fc8f5f19d7a
SHA256160aa9f1e807f960805e15e8a19bfc568789d506b5318b283fa1a70f090b2497
SHA5120b2be7f893761b1e77faed75dff9a5264cacbc3b8f046e8deacf11fc1c70b372d2f915c7c28fe57a257e95482f14682f6c6fe2bcef4d99077624f2284ecb1e5c
-
Filesize
25B
MD5d776c1ea54d64a547e7e79cf9866e79a
SHA188aa93c6e3518e8aa8e180bf7aa90a866d089b2e
SHA256e3a2cb5da275beb096dd338fc3aec422602a8416bed808941db1374edbef58b4
SHA5122f2a01e8fd16799ed712605606ee01886696415d1a43cfb5a6f6afc3965ce9d728bf46221ecca019516cbabaa47521753fcba9a4e62be227f95f3aa0bd7f5e66
-
Filesize
37B
MD590514d330d01223083230c66db693a96
SHA16614fe15a33355af236dc9f1efc65d60c331ad17
SHA2565b06aa2422474d41eab7ddd63763b50fbcbcb10441e80e340db946b1422cf899
SHA5124fdced39f272ddd09648fb228fbc94b4ae0328a8900119d28cb1190be6729505803c992c7a5b4795bfbc203228f5091cb55fce226c5cfb2acce2b1870e54155e
-
Filesize
25B
MD5455606a8ce76478454a9271cf0cd20f8
SHA1dfd6238c9fb16d16a71a1f7e616d65974bc69036
SHA256ac0b11d28c0ed6926261a37d2e5fb0ad65550de1817abd40681e3847fa1289f4
SHA512b8d57cdeed494bb0de7e709bd37d21a9c4781f03bee988287bc93c11a60ac90332838b5a4a8c041173a43123b76863ac1a0ea676c7aec46294c81c136400aa10