Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-10-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
96292453da7dfce366c3241a09646b43.apk
-
Size
3.9MB
-
MD5
96292453da7dfce366c3241a09646b43
-
SHA1
98bd735d05a385ac7c5d8138610c3cab257f0ccc
-
SHA256
6c93a4bb6c6c2c1b1e6be17b2d4f8c0238bb5ae9d391655d2fe7656ee839a3b3
-
SHA512
f9a3093d5e18aebea8def3e8d33b1ab941809cd265750d3d86d74f8d7e4d3e6fb2abb1e4a9ab10571d5e6090c3f60467c9ca75e08db9f9eb3693d02c2c1e5e9a
-
SSDEEP
98304:AqAwqcCIgKPNIq0LUbXrWuMrX4hCYobxLLQxaZOEl0kCHQO:AZwPNxPyLkhMrXIgx3QDE7CHQO
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote payload 1 IoCs
Processes:
resource yara_rule behavioral2/files/fstream-1.dat family_spynote -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.Paper.Islandioc pid Process /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4971 com.Paper.Island /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4971 com.Paper.Island -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.Paper.Island -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.Paper.Island -
Acquires the wake lock 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.Paper.Island -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.Paper.Island -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.Paper.Island -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.Paper.Island -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.Paper.Island -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.Paper.Islanddescription ioc Process Framework service call android.app.job.IJobScheduler.schedule com.Paper.Island -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process File opened for read /proc/cpuinfo com.Paper.Island -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.Paper.Islanddescription ioc Process File opened for read /proc/meminfo com.Paper.Island
Processes
-
com.Paper.Island1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4971
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD55221cc096eff6eaac72225cdc53efff5
SHA1c72bd407b05b3594ac612fb5c0c7ddc2d5b43ab4
SHA2564a1b709094e28110b8502321b8f56e695190aec495aef4fdb1440bc18ea09048
SHA5128a694c1a6be674d781975fa96067e1c3d976444ec4feebc54a2a13d8ecec9ac641118a4f190dabe64f410149740ecd182307ac7d245db980fb5e018d8851a4ab
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
41B
MD520046c5cdf97ca57a834711960a5c31e
SHA17019c9089a919eade9b1ac86be9d3a5f6bb6e16a
SHA2563f29d6ed29ebc4edce53a78e9d27ddc72a07a37c7059940440828841d76e0d13
SHA512487982e62be15409f7599e3f0e709788913bd28ae87a460b441d21658534ce08054e010ec7c19dd5dcf8a97ca75098211107aabcd72567ee0d8b0b832121b8a0
-
Filesize
41B
MD55f6a7de9052ca7659b838a40c6085571
SHA13810efa06ade76e609e525a9fc59d4227da43c6b
SHA256ce5b7c56696824dd599baddf17a437c6bcff91bb63d2cb6a13974e81abc4d825
SHA512f8c42c4cd8e5be8f53bec871675294cdbf1180e581bc42fb867e732b05e573a4926e057906739462a49f78c999f84ed4c3448fd226dd1ebe47611eb98c4c32dd