Analysis

  • max time kernel
    179s
  • max time network
    183s
  • platform
    android_x86
  • resource
    android-x86-arm-20240611.1-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system
  • submitted
    17/06/2024, 10:13

General

  • Target

    Temp_20Mail.apk

  • Size

    3.0MB

  • MD5

    0870496d78aa5b59ad57e914c1d5f6b0

  • SHA1

    5b9bfa06d05172f61d1ee19724fcd12cec110353

  • SHA256

    07346cf8ba8cba881250023326382b88dcf4247cfa64501ccc560667614a7297

  • SHA512

    7d6fa2a95a198d9486fe924d1098d6761d6b36df4c76db502c6a6cc7123621449711e394d6a61a2024bf8e85b556c391e58354d02f03bb9d7ab710ebeba81876

  • SSDEEP

    49152:xcueXk4qYTmiO+KyYWWLPke4H0F7ZbS8ULmc/hcRGU3DrZb:eue5NO4YuUzXUac/WRGU3DVb

Malware Config

Extracted

Family

spynote

C2

156.245.20.17:7771

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • updates.teens.sa
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Checks CPU information
    • Checks memory information
    PID:4290
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/updates.teens.sa/app_apkprotector_dex/oat/x86/classes-v1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4350

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/updates.teens.sa/app_apkprotector_dex/classes-v1.bin

    Filesize

    4.0MB

    MD5

    50c6d6acf87e5fc31279bbcab6e658d2

    SHA1

    3277812d5668f83f4d0f0da6a271d4b77846779e

    SHA256

    95cd7ea94c69d01216dfea9a1b5a6122d5c8ed7bf8c1baf7c37d069c5c4ca671

    SHA512

    6817015f04e265f9cb7d2d5982d942d54ea5aaa1a4bb0a53d580ba4749b416608c150e5063e13ed8ae576607053e25c2f6838a0bffe3449782775ffc39676e41

  • /data/user/0/updates.teens.sa/app_apkprotector_dex/classes-v1.bin

    Filesize

    4.0MB

    MD5

    f52252ff399ae534b767a210d25b92be

    SHA1

    a1f47b82bf11c4b332ab0ca6f6e39d32d47c554c

    SHA256

    e0ccabe4ac76532c2637cedc85435a70a1784d5c3b2eeb5aaef559ccc27601ec

    SHA512

    f76382cc01cdaa06e56794f6aca1378849568a37a83c6e1af60ec0e6b77e14d512a7d7b22da880543c9a9471e0cbcb9ee9ab092a54e3c2d571e57880e60f23ca

  • /storage/emulated/0/Config/sys/apps/log/log-2024-06-17.txt

    Filesize

    280B

    MD5

    024a9da72245fdef4cdec42365b28106

    SHA1

    a59ccd63f10c619cbe7c744ef5ad3fc8f5f19d7a

    SHA256

    160aa9f1e807f960805e15e8a19bfc568789d506b5318b283fa1a70f090b2497

    SHA512

    0b2be7f893761b1e77faed75dff9a5264cacbc3b8f046e8deacf11fc1c70b372d2f915c7c28fe57a257e95482f14682f6c6fe2bcef4d99077624f2284ecb1e5c

  • /storage/emulated/0/Config/sys/apps/log/log-2024-06-17.txt

    Filesize

    25B

    MD5

    d776c1ea54d64a547e7e79cf9866e79a

    SHA1

    88aa93c6e3518e8aa8e180bf7aa90a866d089b2e

    SHA256

    e3a2cb5da275beb096dd338fc3aec422602a8416bed808941db1374edbef58b4

    SHA512

    2f2a01e8fd16799ed712605606ee01886696415d1a43cfb5a6f6afc3965ce9d728bf46221ecca019516cbabaa47521753fcba9a4e62be227f95f3aa0bd7f5e66

  • /storage/emulated/0/Config/sys/apps/log/log-2024-06-17.txt

    Filesize

    37B

    MD5

    90514d330d01223083230c66db693a96

    SHA1

    6614fe15a33355af236dc9f1efc65d60c331ad17

    SHA256

    5b06aa2422474d41eab7ddd63763b50fbcbcb10441e80e340db946b1422cf899

    SHA512

    4fdced39f272ddd09648fb228fbc94b4ae0328a8900119d28cb1190be6729505803c992c7a5b4795bfbc203228f5091cb55fce226c5cfb2acce2b1870e54155e

  • /storage/emulated/0/Config/sys/apps/log/log-2024-06-17.txt

    Filesize

    25B

    MD5

    455606a8ce76478454a9271cf0cd20f8

    SHA1

    dfd6238c9fb16d16a71a1f7e616d65974bc69036

    SHA256

    ac0b11d28c0ed6926261a37d2e5fb0ad65550de1817abd40681e3847fa1289f4

    SHA512

    b8d57cdeed494bb0de7e709bd37d21a9c4781f03bee988287bc93c11a60ac90332838b5a4a8c041173a43123b76863ac1a0ea676c7aec46294c81c136400aa10