Analysis Overview
SHA256
4b8e70ab123a2707f1d2fc97e44da0644f93ec4925495d85232db24938055101
Threat Level: Known bad
The file 4b8e70ab123a2707f1d2fc97e44da0644f93ec4925495d85232db24938055101.bin was found to be: Known bad.
Malicious Activity Summary
Spynote family
Spynote payload
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Requests dangerous framework permissions
Legitimate hosting services abused for malware hosting/C2
Makes use of the framework's foreground persistence service
Declares broadcast receivers with permission to handle system events
Declares services with permission to bind to the system
Registers a broadcast receiver at runtime (usually for listening for system events)
Analysis: static1
Detonation Overview
Reported
2024-07-18 22:06
Signatures
Spynote family
Spynote payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write and read the user's call log data. | android.permission.WRITE_CALL_LOG | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Allows an application to write the user's contacts data. | android.permission.WRITE_CONTACTS | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to read the user's call log. | android.permission.READ_CALL_LOG | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. | android.permission.PROCESS_OUTGOING_CALLS | N/A | N/A |
Analysis: behavioral3
Detonation Overview
Submitted
2024-07-18 22:06
Reported
2024-07-18 22:17
Platform
android-x64-arm64-20240624-en
Max time kernel
178s
Max time network
134s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Processes
cmf0.c3b5bm90zq.patch
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.180.14:443 | tcp | |
| GB | 142.250.180.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.179.232:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.179.228:443 | tcp | |
| GB | 142.250.179.228:443 | tcp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-18 22:06
Reported
2024-07-18 22:17
Platform
android-x86-arm-20240624-en
Max time kernel
178s
Max time network
137s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Registers a broadcast receiver at runtime (usually for listening for system events)
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.registerReceiver | N/A | N/A |
Processes
cmf0.c3b5bm90zq.patch
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-18 22:06
Reported
2024-07-18 22:17
Platform
android-x64-20240624-en
Max time kernel
10s
Max time network
185s
Command Line
Signatures
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | 0.tcp.ngrok.io | N/A | N/A |
| N/A | 0.tcp.ngrok.io | N/A | N/A |
| N/A | 0.tcp.ngrok.io | N/A | N/A |
Processes
cmf0.c3b5bm90zq.patch
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.187.232:443 | ssl.google-analytics.com | tcp |
| GB | 216.58.213.10:443 | tcp | |
| GB | 142.250.179.238:443 | tcp | |
| GB | 142.250.200.34:443 | tcp | |
| GB | 216.58.201.99:443 | tcp | |
| GB | 216.58.201.99:443 | tcp | |
| GB | 216.58.201.99:443 | tcp | |
| US | 216.239.38.223:443 | tcp | |
| BE | 142.251.173.188:5228 | tcp | |
| US | 216.239.38.223:443 | tcp | |
| GB | 142.250.180.14:443 | tcp | |
| GB | 216.58.213.10:443 | tcp | |
| GB | 216.58.213.10:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | tcp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| GB | 216.58.212.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.179.234:443 | semanticlocation-pa.googleapis.com | tcp |
| US | 1.1.1.1:53 | 0.tcp.ngrok.io | udp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | g.tenor.com | udp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| GB | 172.217.16.228:443 | tcp | |
| GB | 172.217.16.228:443 | tcp | |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.134.125.175:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | 0.tcp.ngrok.io | udp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | mdh-pa.googleapis.com | udp |
| GB | 142.250.200.42:443 | mdh-pa.googleapis.com | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | safebrowsing.googleapis.com | udp |
| GB | 142.250.178.10:443 | safebrowsing.googleapis.com | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | www.youtube.com | udp |
| GB | 216.58.201.110:443 | www.youtube.com | udp |
| GB | 216.58.201.110:443 | www.youtube.com | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 1.1.1.1:53 | growth-pa.googleapis.com | udp |
| GB | 172.217.169.74:443 | growth-pa.googleapis.com | tcp |
| US | 1.1.1.1:53 | accounts.google.com | udp |
| US | 1.1.1.1:53 | accounts.google.com | udp |
| BE | 142.250.110.84:443 | accounts.google.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.179.228:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 172.217.169.68:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 142.250.178.10:443 | semanticlocation-pa.googleapis.com | tcp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | i.ytimg.com | udp |
| GB | 142.250.200.22:443 | i.ytimg.com | udp |
| GB | 142.250.200.22:443 | i.ytimg.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.179.228:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | 0.tcp.ngrok.io | udp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |
| US | 3.17.7.232:14051 | 0.tcp.ngrok.io | tcp |