General

  • Target

    easyParcel_v2_(1)_sign_(1)[2].apk

  • Size

    6.2MB

  • Sample

    241005-t61lws1hmg

  • MD5

    9de78c30517a327c01e8b8084ec8eab4

  • SHA1

    74e95cfe06f021994f51d1eb970e159904413d36

  • SHA256

    efd3ddbcf8632f0ca072d165c1d724201ad14b01fabfdf9d4b2b8c017252ebfd

  • SHA512

    83568cf00af77a0f77a575470dd279a132c13d3df35ad1189e79707f898e889f37df78d543b3368270eec3b90ca432d24c38d22821c6ff363b3c6cde26f9994c

  • SSDEEP

    24576:OcPTlJh36recJjZQxcIc3QERbFssNyRpZ46OhjtR7UCpEs6YllC:/PTbZ6qcDVIc3QERbFsJRn43qkw

Malware Config

Extracted

Family

spynote

C2

50.114.5.220:6969

Targets

    • Target

      easyParcel_v2_(1)_sign_(1)[2].apk

    • Size

      6.2MB

    • MD5

      9de78c30517a327c01e8b8084ec8eab4

    • SHA1

      74e95cfe06f021994f51d1eb970e159904413d36

    • SHA256

      efd3ddbcf8632f0ca072d165c1d724201ad14b01fabfdf9d4b2b8c017252ebfd

    • SHA512

      83568cf00af77a0f77a575470dd279a132c13d3df35ad1189e79707f898e889f37df78d543b3368270eec3b90ca432d24c38d22821c6ff363b3c6cde26f9994c

    • SSDEEP

      24576:OcPTlJh36recJjZQxcIc3QERbFssNyRpZ46OhjtR7UCpEs6YllC:/PTbZ6qcDVIc3QERbFsJRn43qkw

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks