Analysis Overview
SHA256
e161e10a6532aeacfb536122b4356bfcde20e64f0bef827d3467e0a14ee97555
Threat Level: Known bad
The file ready5.apk was found to be: Known bad.
Malicious Activity Summary
Spynote family
Obtains sensitive information copied to the device clipboard
Makes use of the framework's Accessibility service
Declares services with permission to bind to the system
Requests dangerous framework permissions
Queries the mobile country code (MCC)
Registers a broadcast receiver at runtime (usually for listening for system events)
Checks CPU information
Checks memory information
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-02 15:47
Signatures
Spynote family
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to read the user's call log. | android.permission.READ_CALL_LOG | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to request installing packages. | android.permission.REQUEST_INSTALL_PACKAGES | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-02 15:47
Reported
2024-07-02 15:50
Platform
android-x86-arm-20240624-en
Max time kernel
179s
Max time network
132s
Command Line
Signatures
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.jenny.duplicate
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.200.46:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
Files
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | cff88c8eecd16454a6bb55e299bfd6bf |
| SHA1 | 8e664af43e1dd7c4a1b4cecf003777f380f7b8a2 |
| SHA256 | 5c72894a611f94875d6f347247b8765705e0e8e945360485775650d504d7ef97 |
| SHA512 | 4f555ea0a7f2409991b9c358d682fc23e5e05e92eddc2445c75d96ca704d8b0705a95dda08bd25e3c862d75f2f44d8be4ba5d366397cf2b63db71191f0b440fe |
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | b79d79a4c35260ff75e71935be06775e |
| SHA1 | bd3929c17709a90f85e4a61c954c5e05a4978ae1 |
| SHA256 | fca4a442b9bfee747cb839b63af04cc4cab49247c1a4c5bebbf165e541750860 |
| SHA512 | 3fa0c32c7eedf4f9b9dbd688249ff7597f37e45bbdbc0c2623b198e15e4f3637fe56d5b1cafc04bc11ac7ff527410a2d53be4d53a4bf1d621e6ed3d1549fb812 |
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | 84aaa3e2fe801858475ebc1896ec0905 |
| SHA1 | 55668d48e0b34bbf36ac9bf718bab59d253b70a3 |
| SHA256 | d495bf20c4e6c7a1e6344fd6c7294eafdbca94ba255af03024decef66b88d7d6 |
| SHA512 | b25e156a05a9c4fc28837a793bc65649857981b18122c2d76b068ddf9d0174657ad5c8ad899193125c064e7f8aff665b171d5d5b44b576349698df191a2c7882 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-02 15:47
Reported
2024-07-02 15:50
Platform
android-x64-20240624-en
Max time kernel
165s
Max time network
137s
Command Line
Signatures
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries the mobile country code (MCC)
| Description | Indicator | Process | Target |
| Framework service call | com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.jenny.duplicate
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.200.40:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.179.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.238:443 | android.apis.google.com | tcp |
| GB | 142.250.200.36:443 | tcp | |
| GB | 142.250.200.36:443 | tcp |
Files
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | 84aaa3e2fe801858475ebc1896ec0905 |
| SHA1 | 55668d48e0b34bbf36ac9bf718bab59d253b70a3 |
| SHA256 | d495bf20c4e6c7a1e6344fd6c7294eafdbca94ba255af03024decef66b88d7d6 |
| SHA512 | b25e156a05a9c4fc28837a793bc65649857981b18122c2d76b068ddf9d0174657ad5c8ad899193125c064e7f8aff665b171d5d5b44b576349698df191a2c7882 |
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | 6517749f1bbb71259067623498b5b282 |
| SHA1 | a6d9677172333f7ec67d2ea8173b7b9b4959a3d4 |
| SHA256 | c20b6a646d477001d042d80b3bf8fb66674dd2bbdd9ccbcbb6681502bfcf1bc2 |
| SHA512 | 37e556e90d4671eb629ab7c20a88a6c830da485d4087ec97cdf09fa827718550cdb0b8ca11bdac4585442a44586a82b338ecd6ee0f1178ce70a06a2cd2415cf2 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-02 15:47
Reported
2024-07-02 15:50
Platform
android-x64-arm64-20240624-en
Max time kernel
61s
Max time network
162s
Command Line
Signatures
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
com.jenny.duplicate
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.206:443 | tcp | |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.16.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.178.8:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp |
Files
/storage/emulated/0/Config/sys/apps/log/log-2024-07-02.txt
| MD5 | 84aaa3e2fe801858475ebc1896ec0905 |
| SHA1 | 55668d48e0b34bbf36ac9bf718bab59d253b70a3 |
| SHA256 | d495bf20c4e6c7a1e6344fd6c7294eafdbca94ba255af03024decef66b88d7d6 |
| SHA512 | b25e156a05a9c4fc28837a793bc65649857981b18122c2d76b068ddf9d0174657ad5c8ad899193125c064e7f8aff665b171d5d5b44b576349698df191a2c7882 |