Analysis Overview
SHA256
6cb0c7f2a254e625a7cb56c9ed12b897a631bfbfd16dc39e734f95fbbb44242e
Threat Level: Known bad
The file qwd.apk was found to be: Known bad.
Malicious Activity Summary
Spynote family
Spynote payload
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Loads dropped Dex/Jar
Obtains sensitive information copied to the device clipboard
Makes use of the framework's Accessibility service
Acquires the wake lock
Performs UI accessibility actions on behalf of the user
Makes use of the framework's foreground persistence service
Declares services with permission to bind to the system
Requests dangerous framework permissions
Declares broadcast receivers with permission to handle system events
Requests enabling of the accessibility settings.
Schedules tasks to execute at a specified time
Enumerates physical storage devices
Checks CPU information
Checks memory information
Modifies registry class
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-08-07 15:20
Signatures
Spynote family
Spynote payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
| Required by VPN services to bind with the system. Allows apps to provision VPN services. | android.permission.BIND_VPN_SERVICE | N/A | N/A |
| Required by input method services to bind with the system. Allows apps to provide custom input methods (keyboards). | android.permission.BIND_INPUT_METHOD | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows an application to read the user's call log. | android.permission.READ_CALL_LOG | N/A | N/A |
| Allows an application to read the user's contacts data. | android.permission.READ_CONTACTS | N/A | N/A |
| Allows access to the list of accounts in the Accounts Service. | android.permission.GET_ACCOUNTS | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an app to access precise location. | android.permission.ACCESS_FINE_LOCATION | N/A | N/A |
| Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. | android.permission.CALL_PHONE | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to request installing packages. | android.permission.REQUEST_INSTALL_PACKAGES | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-08-07 15:20
Reported
2024-08-07 15:42
Platform
android-33-x64-arm64-20240624-en
Max time kernel
511s
Max time network
1231s
Command Line
Signatures
Loads dropped Dex/Jar
| Description | Indicator | Process | Target |
| N/A | /storage/emulated/0/AppData/meta_data0 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data1 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data2 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data3 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data4 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data5 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data6 | N/A | N/A |
| N/A | /storage/emulated/0/AppData/meta_data7 | N/A | N/A |
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId | N/A | N/A |
Obtains sensitive information copied to the device clipboard
| Description | Indicator | Process | Target |
| Framework service call | android.content.IClipboard.addPrimaryClipChangedListener | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Performs UI accessibility actions on behalf of the user
| Description | Indicator | Process | Target |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
Requests enabling of the accessibility settings.
| Description | Indicator | Process | Target |
| Intent action | android.settings.ACCESSIBILITY_SETTINGS | N/A | N/A |
Schedules tasks to execute at a specified time
| Description | Indicator | Process | Target |
| Framework service call | android.app.job.IJobScheduler.schedule | N/A | N/A |
Checks CPU information
| Description | Indicator | Process | Target |
| File opened for read | /proc/cpuinfo | N/A | N/A |
Checks memory information
| Description | Indicator | Process | Target |
| File opened for read | /proc/meminfo | N/A | N/A |
Processes
build.ledear.apk
Network
| Country | Destination | Domain | Proto |
| GB | 142.250.187.228:443 | udp | |
| GB | 142.250.187.228:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.187.228:443 | udp | |
| GB | 142.250.187.228:443 | udp | |
| GB | 142.250.187.228:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.169.14:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | rcs-acs-tmo-us.jibe.google.com | udp |
| US | 216.239.36.155:443 | rcs-acs-tmo-us.jibe.google.com | tcp |
| RU | 93.183.95.210:5557 | tcp | |
| US | 1.1.1.1:53 | 210.95.183.93.in-addr.arpa | udp |
| US | 1.1.1.1:53 | v2530316.hosted-by-vdsina.ru | udp |
| GB | 142.250.187.238:443 | tcp | |
| GB | 142.250.187.238:443 | tcp | |
| US | 1.1.1.1:53 | remoteprovisioning.googleapis.com | udp |
| US | 162.159.61.3:443 | tcp | |
| US | 162.159.61.3:443 | tcp | |
| US | 162.159.61.3:443 | tcp | |
| US | 162.159.61.3:443 | udp | |
| US | 34.104.35.123:80 | tcp | |
| GB | 142.250.187.228:443 | tcp | |
| GB | 142.250.178.4:443 | tcp | |
| GB | 142.250.178.4:443 | tcp | |
| GB | 216.58.204.67:443 | tcp | |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.178.4:443 | www.google.com | udp |
| US | 1.1.1.1:53 | newsstand.googleusercontent.com | udp |
| GB | 142.250.179.225:443 | newsstand.googleusercontent.com | tcp |
| GB | 142.250.179.225:443 | newsstand.googleusercontent.com | tcp |
| GB | 142.250.179.225:443 | newsstand.googleusercontent.com | tcp |
| GB | 142.250.179.225:443 | newsstand.googleusercontent.com | tcp |
| GB | 216.58.201.123:443 | tcp | |
| US | 1.1.1.1:53 | social-magazines-prod.storage.googleapis.com | udp |
| GB | 142.250.200.27:443 | social-magazines-prod.storage.googleapis.com | tcp |
| US | 1.1.1.1:53 | encrypted-tbn0.gstatic.com | udp |
| GB | 216.58.204.78:443 | encrypted-tbn0.gstatic.com | tcp |
| GB | 216.58.201.98:443 | tcp | |
| GB | 216.58.201.98:443 | tcp | |
| GB | 216.58.201.98:443 | tcp | |
| GB | 216.58.213.6:443 | tcp | |
| GB | 142.250.200.2:443 | tcp | |
| GB | 216.58.212.206:443 | tcp | |
| US | 216.239.32.36:443 | tcp | |
| GB | 172.217.169.1:443 | tcp | |
| GB | 216.58.213.1:443 | tcp | |
| GB | 172.217.169.1:443 | tcp | |
| GB | 172.217.169.1:443 | tcp | |
| GB | 172.217.169.1:443 | tcp | |
| GB | 172.217.169.1:443 | tcp | |
| GB | 216.58.204.67:443 | tcp | |
| US | 172.64.41.3:443 | tcp | |
| US | 172.64.41.3:443 | tcp | |
| GB | 142.250.180.14:443 | tcp | |
| US | 1.1.1.1:53 | rcs-acs-tmo-us.jibe.google.com | udp |
| US | 216.239.36.155:443 | rcs-acs-tmo-us.jibe.google.com | tcp |
| GB | 216.58.204.67:443 | tcp | |
| GB | 216.58.204.67:443 | tcp | |
| GB | 216.58.204.67:443 | tcp | |
| US | 216.239.32.223:443 | tcp | |
| BE | 74.125.71.188:5228 | tcp | |
| US | 1.1.1.1:53 | gmscompliance-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | mdh-pa.googleapis.com | udp |
| US | 1.1.1.1:53 | safebrowsing.googleapis.com | udp |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | udp |
| GB | 142.250.200.46:443 | android.apis.google.com | udp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 162.159.61.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 172.64.41.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 172.64.41.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 1.1.1.1:53 | www.google.com | udp |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 142.250.180.4:443 | www.google.com | tcp |
| GB | 142.250.180.4:443 | www.google.com | tcp |
| US | 1.1.1.1:53 | rcs-acs-tmo-us.jibe.google.com | udp |
| US | 216.239.36.155:443 | rcs-acs-tmo-us.jibe.google.com | tcp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 1.1.1.1:53 | chrome.cloudflare-dns.com | udp |
| US | 172.64.41.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 172.64.41.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 162.159.61.3:443 | chrome.cloudflare-dns.com | tcp |
| US | 162.159.61.3:443 | chrome.cloudflare-dns.com | udp |
| US | 172.64.41.3:443 | chrome.cloudflare-dns.com | udp |
| GB | 142.250.180.3:443 | tcp | |
| US | 1.1.1.1:53 | update.googleapis.com | udp |
| US | 34.104.35.123:443 | edgedl.me.gvt1.com | tcp |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
| RU | 93.183.95.210:5557 | v2530316.hosted-by-vdsina.ru | tcp |
Files
/storage/emulated/0/AppData/meta_data0
| MD5 | effbc10b41f027e5c2130835d524c99d |
| SHA1 | affb65361d7a36d00e402ad869696578b5ac3259 |
| SHA256 | 566fb91b6bf186c05c4ec051aa2e2802961cbb158df24a8fecaa0678febece84 |
| SHA512 | b2ddd0142a80663097e9b71d8d654d88382ef8f765c92f0c8fbf600f1174cb1b1e9e61088f954e609e6d2402fd4750b88945af7c1080018b991f2e6e6d9ad52a |
/storage/emulated/0/AppData/meta_data1
| MD5 | 3748dfbaeae0d43d38471f14e4321dcd |
| SHA1 | a5a6dcb2e325479cb25a44cb66216e09a843666c |
| SHA256 | 4830f1d48d41c7725686901a2d4f93a8ea722f6160dfecc6815ac85598e361db |
| SHA512 | bde4b86489abafb3a5aff955ce232367044b6fdf106ea02847c3dbd78e49a02dd7c63bf82c26a3b630962aad16a877ece85af74608909a37a89b0591e012625c |
/storage/emulated/0/AppData/meta_data1
| MD5 | 514d884ca8bb12d1b8f440f3e64c3f9f |
| SHA1 | 6242b72c85ce2a287e95fb2522afe1f559b277aa |
| SHA256 | 5a9b87d66daf4ad4791d980d9c3270c7806bc18c89e323472a500fb8ebfefc5e |
| SHA512 | c18018ecb5742753f72dbe369c6f21b391b514a3d0dda2ef404cd53be299c42f3c774c7bec085d7c5713d42cf0fdb2f9e629d6cf5d635d3ca9271147e8420ac2 |
/storage/emulated/0/AppData/meta_data2
| MD5 | a6fcd52b6b66cecf6862b4f36341bc04 |
| SHA1 | 8b21ceb4d264f40cf7da42ce630c991a0eea4090 |
| SHA256 | 47bb8e56ea3c98e4a3a8b1e557e8b8d7683683e6657df223907b7c1ef085018f |
| SHA512 | 90ed714810ad62ef12e861506814f595db1c407aa5d2ee659e0bf5fb67cc1d8bcfc5bd776c82ea7fc0e6cdb21e25e4fc0399e90bfdf666a2296769bdfb0efce9 |
/storage/emulated/0/AppData/meta_data2
| MD5 | 6b2bac966edac0048bac4336dd7ffdab |
| SHA1 | 4fa290b1ae3d09a70f29e05ac33701a937307a29 |
| SHA256 | 9a0285c31c82617f5d5823210791ab57fa29c92ca8107b0fa0e7a7a35be96af8 |
| SHA512 | 758a90200d4f08c263d52c931a2cdc9ce066d87c89f786e04b56cc90bdfce7918001db0349e7a037c5e79a7eeb9d3f6e43c661d37c0cdda43f7bf2853d63f4e2 |
/storage/emulated/0/Config/sys/apps/log/log-2024-08-07.txt
| MD5 | de2c41a51ee9246eb1708f65b511add0 |
| SHA1 | 2f442d634c8a18760a232c8829d4b5d74a52f074 |
| SHA256 | ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab |
| SHA512 | 7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a |
/storage/emulated/0/Config/sys/apps/log/log-2024-08-07.txt
| MD5 | ba30336bf53d54ed3c0ea69dd545de8c |
| SHA1 | ce99c6724c75b93b7448e2d9fac16ca702a5711f |
| SHA256 | 2d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af |
| SHA512 | eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e |
/storage/emulated/0/Config/sys/apps/log/log-2024-08-07.txt
| MD5 | bdb821a955117250611e94cd23842584 |
| SHA1 | 81edcea1b44f94cfc140710c8410d0696b760c67 |
| SHA256 | 076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d |
| SHA512 | e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268 |
/storage/emulated/0/Config/sys/apps/log/log-2024-08-07.txt
| MD5 | 372391c0b41e754f8f0418ba69e59d56 |
| SHA1 | f64c4bbf289e5f867619655dc11a04b06cea16bd |
| SHA256 | d2bace12d7c105fe6a72b0e9672ce9cf8a8781f8c95aae776a70bc37ca099489 |
| SHA512 | 65e51443c627085a7e36274b64779a8a617e164ac2ebb16d0b32a9764281f97eaa7fd34c3d4e3199ec65ee0c60a748b24ecd2137c5b13c202f8e92f15dc24c3d |
/storage/emulated/0/AppData/meta_data3
| MD5 | 458d9b8746910691b67826098a3aadde |
| SHA1 | c12e70c872a435fc0077d4abd2f4bdff80576d57 |
| SHA256 | ef75d7f7c01e9cb9a48f38e08195e0597f751b0700fdd92c59113049a39682a8 |
| SHA512 | 76c2107449a99f3f9ba69a9d4e39e58607e231fdc2e8daef7f8c3ab39d108f18d01a6eeaf7925581aa3f635fb75350209ca2c198db21fd6ca706457377cac76a |
/storage/emulated/0/AppData/meta_data4
| MD5 | 9c6503eafa45558f1eb5f125c542bb0f |
| SHA1 | c8b67c7a056b96a7916fc97a597bff934e972fb0 |
| SHA256 | 7406077989fdcda2109ab3e591efc15fabee97109355d94c09dbc0e951a191c4 |
| SHA512 | 8234eab43a65e8714605541b3f970a4fc784b301e3c49a062d5f951a78135c98574d8c09419412187bcc4a5d8091d82889a4df7eb066db482a0fd87cfd36d0dc |
/storage/emulated/0/AppData/meta_data5
| MD5 | 1a26c5544e9f9f82b3c020c49162764a |
| SHA1 | 3689b5b26e85472785082c3f879da9bcbba22655 |
| SHA256 | d365285ec8822cc96ffa79d9596e03bb0fef3bcff4d2cf9b890340fec6458459 |
| SHA512 | d240e89ce386672b339d8c72b64bc41106b326b4d592ad2dd4aa3ac449a8e5d4930fb705d104f0ee8831ce188e54a644fbde0d3e2da1d788f83781bbb02a5f0f |
/storage/emulated/0/AppData/meta_data5
| MD5 | 29b80b15673d46bfda32d7beaf2457b6 |
| SHA1 | cda13c92638243b9116d3ddeb49c792a6b5369bd |
| SHA256 | 2b111730487405bef3ad063f3bad8bcbe409fac4ee00c08ce6122b27c6298254 |
| SHA512 | 1810eeb08a7fc3be4ea0648aae082cea2bca5987972d65f82bd427025fe055c4c1942f2c045a9a95cbfaa60f64d436d6528337f34602c63362ed895c0d92210c |
/storage/emulated/0/AppData/meta_data6
| MD5 | 42602d32a96f59366c36ca9dac5ce28d |
| SHA1 | 9690c0c6510cb5c7be9182d41dad381a1262065b |
| SHA256 | e15552b3ab0824370ff36e1ee461251d72fef39ab75722a56064259049370b3e |
| SHA512 | ded18e20f4b4353ee5e65f96a0d8297dc1f7f5802a18332de7fa3aaf6f4cb9b81982cb266c6779e9b1c4791aaa4eb8e04e3214b792c0a98b69a41654158684bb |
/storage/emulated/0/AppData/meta_data6
| MD5 | b0fb4b4b85453c7413ce34f558dde399 |
| SHA1 | e64d0e87b0baf84cc2c7e4c4dc1cfe8adcf9376f |
| SHA256 | ad712097c583f970a7490dcd56f6c85fb3398dc6a5922b8477617fb741385eb0 |
| SHA512 | a02ddb7cccd7a820f059c9aa0869d1258d6cd4e1772dbda41d50c967f0da934223d304c4d4ec914b2dfc6b3fb0edbc40b45b2bce68915a312dc0140358dfd036 |
/storage/emulated/0/AppData/meta_data7
| MD5 | 24187c8d4a921022947272a9803b3f41 |
| SHA1 | 1620aadbdbcd4adebe67316e89e8c65d1f61b8c4 |
| SHA256 | 5468034e8a0355df93f6b070a8025304900219588f6c946f4ad37ba5750a53c0 |
| SHA512 | aa1ecef797d063e091c0e149747f331b90051c007cedaee72407f0c533e25086f2a6bdcc3ea4a6686ca595ab9ef577ef11bcd14c0fc26daa5f8f76ab513a3978 |
/storage/emulated/0/AppData/meta_data7
| MD5 | 36d7729b8cc8ace6afcc472b3f1220db |
| SHA1 | 3f1d7cb1dd721cad2cf955303872e3bec883968e |
| SHA256 | 58d71a9c91d09e4a5e3cbf4c543daf97e8f2ce31295efb6547d3eb535bd9a148 |
| SHA512 | e98135aee684654d62bccac9014d8d15b6d1cddcf303aef10c31d9352ed3fde35c922341ce5d7245e38d8d53c022ecb7953a59632873915af211df90784fa621 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-08-07 15:20
Reported
2024-08-07 15:41
Platform
win10-20240404-en
Max time kernel
316s
Max time network
888s
Command Line
Signatures
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings | C:\Windows\system32\cmd.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings | C:\Windows\system32\OpenWith.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\OpenWith.exe | N/A |
Processes
C:\Windows\system32\cmd.exe
cmd /c C:\Users\Admin\AppData\Local\Temp\qwd.apk
C:\Windows\system32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |