Analysis
-
max time kernel
179s -
max time network
188s -
platform
android_x64 -
resource
android-33-x64-arm64-20240611.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system -
submitted
17-06-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
Translate.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral2
Sample
Translate.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral3
Sample
Translate.apk
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-33-x64-arm64-20240611.1-en
General
-
Target
childapp.apk
-
Size
5.9MB
-
MD5
4ba22114b4b4eabac35d708ceafda99b
-
SHA1
5ba11a42028fcb4a43aea514d5f4247a22a93dbb
-
SHA256
39d2d4af6ca442b175c40c0d608a8265dca4ab53e4859ad24789b23494bc8193
-
SHA512
035a98995ec48a92aad98de6d5e652a03487120e664e2f8932c61b6316532ad439fb4e8f7500fe0edbe508a374ce2d4861baff0dbf1ee69c851666c64f5c5659
-
SSDEEP
98304:9oMU1WRYSale8PkTGBD9xvgbHDHFIzmWAfaCsMul+hlX7/RatQOErR2qdD4SKG2H:mxSale8PfTBgzDq0iFMul6Atid8Xb1O+
Malware Config
Extracted
spynote
kyabhai.duckdns.org:8080
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/editor.disciplines.fail/app_ded/r8F0oxVqACZgLewHO0cp7dBQWc60n6ve.dex 4235 editor.disciplines.fail -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText editor.disciplines.fail Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId editor.disciplines.fail Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId editor.disciplines.fail -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener editor.disciplines.fail -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock editor.disciplines.fail -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground editor.disciplines.fail -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction editor.disciplines.fail -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo editor.disciplines.fail -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS editor.disciplines.fail -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule editor.disciplines.fail -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal editor.disciplines.fail -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo editor.disciplines.fail -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo editor.disciplines.fail
Processes
-
editor.disciplines.fail1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4235
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD58207981590d82bc36b9dbe639b72e315
SHA12051b80b757df1ae184354eac86659acaf5f479c
SHA25636a6bab79f7ea03e0bf4448abfb073733299859243fe08b12582a2eb2039db1f
SHA51233cf767d56dffec4f2a80f3a142a30302384fb713f805aec98bea7b0783794b8c690ed665af10e22c0d11684fd2cb5937d7a808ab29c3af7819cd97c56382d54
-
Filesize
33B
MD5457bb67ebbcfd6615a72a57bbaba8611
SHA1800c43984ec29c34462d915109edd5202c28b74e
SHA256a7f63da9797585957f923d9226c697d5d3d80c059b3b381baaff04c6c73b8a10
SHA512dd94d35b710137a719ef3ada6f609ef1d05b96e2a32e2c8435809786095db09a049b8aa2e9c40de7af941be67904eecff76b22c4470f57d23a7b3c31970c02ae
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
268B
MD5d257ff88a24e508ee9fbd7c35f614b06
SHA134a278dfacce284d26251f1f3d9aaec0ebb6ff36
SHA256b6b508e4d94a941ff42eded8a75095d14d1e1f11588c305beb7b4a7f2e10baac
SHA5127471701c87dc5e2997aa2c3e29c182eda671a0e8aceabdbe82205b4268af80878e91ea818aa13418f3307c005b66c0a66916b82e2590fcde9315b1f22bcef5c6
-
Filesize
57B
MD5bc052a2c34ee49dee28310f3a8b61512
SHA16b8cb8645fbf7627af8057e1b5a6c1f8d98b14a5
SHA2566038df308211dd1c0bea9b67e8b19f413d5bbe9e125c65c0b4dd23f747367d24
SHA512b970abb11c1dea0afe968ac47f9432afbcc182ea5bd6b2d99ede1a8dc8912029975497da9cb3f261dea31c6a5ef1dc906ccfbd3aaa3b812234ea8856181fce5f