General
-
Target
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32.bin
-
Size
2.9MB
-
Sample
241001-1y82mawfkh
-
MD5
b74f8fa7b3e078201eefd0caec46728e
-
SHA1
e9b17b0168f135e5060c32ff4c3b0a5e8d9549f7
-
SHA256
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32
-
SHA512
8dec1bed11a505ff829c8634b1d28d722ca8f3c678c7194794e52cf1970e93e36280f7b1f6bd95ad6162a232ae5a8927af069af8f819c99c56f8ec7551f4e4de
-
SSDEEP
49152:H6cLz9gEv5b4cRjpX8hSYk8d7oaO/zuYLpTBy4tj0CHSfquzGO3ZuZi4/nzB94qg:HxTv5b4cRjpX8T9NoX3Lp9y4+nyu8ZiN
Static task
static1
Behavioral task
behavioral1
Sample
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
217.114.43.238:15888
Targets
-
-
Target
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32.bin
-
Size
2.9MB
-
MD5
b74f8fa7b3e078201eefd0caec46728e
-
SHA1
e9b17b0168f135e5060c32ff4c3b0a5e8d9549f7
-
SHA256
28c6aba9cd546e4d049e1da7f592706dd969cd492252a9155fb728747eb8ad32
-
SHA512
8dec1bed11a505ff829c8634b1d28d722ca8f3c678c7194794e52cf1970e93e36280f7b1f6bd95ad6162a232ae5a8927af069af8f819c99c56f8ec7551f4e4de
-
SSDEEP
49152:H6cLz9gEv5b4cRjpX8hSYk8d7oaO/zuYLpTBy4tj0CHSfquzGO3ZuZi4/nzB94qg:HxTv5b4cRjpX8T9NoX3Lp9y4+nyu8ZiN
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1