Malware Analysis Report

2024-07-28 14:46

Sample ID 240617-me273swfqa
Target NoDrunkDrive.apk
SHA256 21db863adabb9af31ba600a871ccc2228f178101ac73332d2dd22fdec74103af
Tags
banker discovery evasion impact persistence privilege_escalation spynote
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

21db863adabb9af31ba600a871ccc2228f178101ac73332d2dd22fdec74103af

Threat Level: Known bad

The file NoDrunkDrive.apk was found to be: Known bad.

Malicious Activity Summary

banker discovery evasion impact persistence privilege_escalation spynote

Spynote family

Spynote payload

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Declares services with permission to bind to the system

Makes use of the framework's foreground persistence service

Requests enabling of the accessibility settings.

Tries to add a device administrator.

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-17 10:23

Signatures

Spynote family

spynote

Spynote payload

Description Indicator Process Target
N/A N/A N/A N/A

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-17 10:23

Reported

2024-06-17 10:26

Platform

android-x86-arm-20240611.1-en

Max time kernel

178s

Max time network

131s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

cmf0.c3b5bm90zq.patch

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 172.217.169.10:443 tcp

Files

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 a7c95c8d9d10396e05884966a39e2dba
SHA1 f57f792c8a430072c78d5c656be32d1495fd2db6
SHA256 d176305a648d565c61e5405b3b13601d834eeb4b30c7a2a60b12250cc66bca5a
SHA512 3a5d7032113bf4917198059492f11535389722aac5c1854e2aa0e325ed49531e9422fc348bed12c84d2f5428ff3c5df61f498fd18e5725c505246881952f7506

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 3bfa791f0d751350dea469dc569546cf
SHA1 1e8ca1530c5a415b5dfe2ef392b9b7012cba7ab5
SHA256 30f4cfbdbc154d1c399e07947255d51ed00805ad31bae69c7007977ca59c73e4
SHA512 d6e5c4ed3e3614d81ded91a710a2df85aaea9e952525e5d141778ccb24be012ac680a2b1c18742106bef172eca2553089ab9e477d7beb2f69b624f5caca938f2

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 05e96860d3fdb1c9df9105b8f076cdb7
SHA1 86d2a6e89ca03930847064c50961c850dcff6927
SHA256 3fc680695e90f13e709f36021f77dc3b779acd7a4e1c884da33dbe65e4f3f46f
SHA512 0bcb8736595485b2c8b0f46e48024df905c14c1f5c4bbfa845b77738c8800aa6846e97a322a98ce15ee1359eadd6a31076c39a3e12967e4cd0ab3e7def4842e4

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 c3b7331ba3f57cd9d9c91c255e63c7a6
SHA1 a8aa96f7be6058a34eef3c2875c386ca89855eb5
SHA256 84a899d362c11301bfda5d6e034d3c2936811bb227881afc3bdceac8c14bc92c
SHA512 1db7fa6d04a331a7947af7d22716009d867151fd3bbf2f2f75f5aa5f7bb20a6a64adc7b61ad56b73e58eb5793430e2acb3b3bfe9d19c8e588df95504bac14122

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 8d8af5ce8febbb782140815b52f1eb0e
SHA1 d6682d0705406fab13392de333f911007ed73b50
SHA256 cc532ce84b8d8d1aeea6b8103ed0ce743b1be22a6536cdef582bf9ba817b52dd
SHA512 1e16134572692417463336524c127709bbad21a6ad61841ed20560e6ced7ce15b03d3d91cb74e797b4dd43e307369467fa2a2b228e10c7fb623c7eddfa145565

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 6aff87bf7e0e2110427f268a53e0e1dd
SHA1 062409d95104029720de1d406c1e9c679edb329f
SHA256 84d4cd8bb8fc94c2e3a553e3cb98d42f22b1aa06c97ce2f15abfcb71dac43d81
SHA512 b4d9ee6e53b2f575e61038687e1cca1905fbe98fd7089a73dad09b5706b8a74c010e3a846b57a91acb61a574774931722d8cf9c85491bd55a62758969c993a6f

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 10:23

Reported

2024-06-17 10:26

Platform

android-x64-arm64-20240611.1-en

Max time kernel

178s

Max time network

132s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Processes

cmf0.c3b5bm90zq.patch

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.10:443 tcp
GB 142.250.200.10:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.179.232:443 ssl.google-analytics.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/storage/emulated/0/Dolbysoundsystem/config17-06-2024.log

MD5 88650b8108390fab7875d16f26641253
SHA1 cfa1c0ffa70b77854e03185c9dee91ab311d4800
SHA256 8ef38dcfd121d5f476983bf3a3b83724965c3c5c79f80dd0cd08c39881d2e568
SHA512 4c9fd052adae6cf14e272c5efcc318ad8994ef692e0d302c858ed515c797357cad7eea65b68ca9767becb6030b6ab64f9d65fccaf12fc738644d1a1bb819efb4

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-17 10:23

Reported

2024-06-17 10:26

Platform

android-33-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

132s

Command Line

cmf0.c3b5bm90zq.patch

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Processes

cmf0.c3b5bm90zq.patch

Network

Country Destination Domain Proto
GB 172.217.16.228:443 udp
GB 172.217.16.228:443 tcp
GB 216.58.212.196:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 remoteprovisioning.googleapis.com udp
GB 142.250.200.10:443 remoteprovisioning.googleapis.com tcp
US 162.159.61.3:443 tcp
US 162.159.61.3:443 tcp
GB 142.250.179.227:443 tcp
US 162.159.61.3:443 udp
GB 142.250.179.227:443 udp
GB 172.217.16.228:443 udp
GB 142.250.179.228:443 udp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

N/A