Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11/10/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
96292453da7dfce366c3241a09646b43.apk
-
Size
3.9MB
-
MD5
96292453da7dfce366c3241a09646b43
-
SHA1
98bd735d05a385ac7c5d8138610c3cab257f0ccc
-
SHA256
6c93a4bb6c6c2c1b1e6be17b2d4f8c0238bb5ae9d391655d2fe7656ee839a3b3
-
SHA512
f9a3093d5e18aebea8def3e8d33b1ab941809cd265750d3d86d74f8d7e4d3e6fb2abb1e4a9ab10571d5e6090c3f60467c9ca75e08db9f9eb3693d02c2c1e5e9a
-
SSDEEP
98304:AqAwqcCIgKPNIq0LUbXrWuMrX4hCYobxLLQxaZOEl0kCHQO:AZwPNxPyLkhMrXIgx3QDE7CHQO
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_spynote behavioral1/memory/4213-1.dex family_spynote -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4213 com.Paper.Island /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4282 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.Paper.Island/app_app_dex/oat/x86/qcsgaxeia1.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4213 com.Paper.Island -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.Paper.Island -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.Paper.Island -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.Paper.Island -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.Paper.Island -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.Paper.Island -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.Paper.Island -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.Paper.Island -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.Paper.Island -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.Paper.Island
Processes
-
com.Paper.Island1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4213 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.Paper.Island/app_app_dex/oat/x86/qcsgaxeia1.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4282
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD55221cc096eff6eaac72225cdc53efff5
SHA1c72bd407b05b3594ac612fb5c0c7ddc2d5b43ab4
SHA2564a1b709094e28110b8502321b8f56e695190aec495aef4fdb1440bc18ea09048
SHA5128a694c1a6be674d781975fa96067e1c3d976444ec4feebc54a2a13d8ecec9ac641118a4f190dabe64f410149740ecd182307ac7d245db980fb5e018d8851a4ab
-
Filesize
5.2MB
MD5609b205b1e71a93331ab01189bbb1bba
SHA1bdf343d6888d5e9a1ab959ded4ec3b6d6f4e0bdd
SHA256baada4d687f35689d97f85753d8f5b2da5452ca7d7bc922a14cab2cba21f5cbc
SHA5128cf08d79e4221d173277f1902a6e848fa206920b03f4abce7b0eb0387a141e294a84b87fb9d12dcb4ed1691981fc6cf81796c1f53ef98784d91e2804d2e92a54
-
Filesize
65B
MD5e3e3e6b8bf35b76c2601fa2bd45a2bf0
SHA122550d5ac870f152f5cb3bb85221606d24877f36
SHA256074baf7441cbee548f61a0bc118a51a426aaed93b9192647d5b1a99801a51c41
SHA51210a5bbc7e90b2b91b6e6ae1b31b75758a1dfe84ed8ccf5a08cdbfe99481103d9e5f28018f8794df59c354e0b367576a8faecde6578ddd3b79d4a55eb3f6f1f19
-
Filesize
65B
MD5314f7d078ecb796a5b748ce5f7cbe4d7
SHA11b398115eb3b65eb2f53be7d4e9d5c5514d14adc
SHA25620866f2cea95ae441820ea796d069f00a07a43cf8290acf05ccd7316a6be47da
SHA512aa5460654b081aa84e63bf8c64c03d8c263d92c5274912c077f57f7d84168e2898cd8ecc524d06f757408505c85387a256fbcf73415420af50f655737582a80a
-
Filesize
41B
MD50b844e514d63d52af0ccb8f9a7d059d3
SHA1b202b833af12587fd472ff55a1c15f740e5838ac
SHA256a568a1207c9dda7cfac6dad50fe9d001a42b471803e7fbdb91b5c1121ee5faec
SHA512dd9646501f8533fd010c0ec9a13edf0d344297b9993365997186c28f9ccabd04ed9db2589792fcfe249eee05ac480e09101eddc2438e3ec55318e1b8474152b6
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a