Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11/10/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
96292453da7dfce366c3241a09646b43.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
96292453da7dfce366c3241a09646b43.apk
-
Size
3.9MB
-
MD5
96292453da7dfce366c3241a09646b43
-
SHA1
98bd735d05a385ac7c5d8138610c3cab257f0ccc
-
SHA256
6c93a4bb6c6c2c1b1e6be17b2d4f8c0238bb5ae9d391655d2fe7656ee839a3b3
-
SHA512
f9a3093d5e18aebea8def3e8d33b1ab941809cd265750d3d86d74f8d7e4d3e6fb2abb1e4a9ab10571d5e6090c3f60467c9ca75e08db9f9eb3693d02c2c1e5e9a
-
SSDEEP
98304:AqAwqcCIgKPNIq0LUbXrWuMrX4hCYobxLLQxaZOEl0kCHQO:AZwPNxPyLkhMrXIgx3QDE7CHQO
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote payload 1 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_spynote -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4482 com.Paper.Island /data/user/0/com.Paper.Island/app_app_dex/qcsgaxeia1.yto 4482 com.Paper.Island -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.Paper.Island -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.Paper.Island -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.Paper.Island -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.Paper.Island
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD55221cc096eff6eaac72225cdc53efff5
SHA1c72bd407b05b3594ac612fb5c0c7ddc2d5b43ab4
SHA2564a1b709094e28110b8502321b8f56e695190aec495aef4fdb1440bc18ea09048
SHA5128a694c1a6be674d781975fa96067e1c3d976444ec4feebc54a2a13d8ecec9ac641118a4f190dabe64f410149740ecd182307ac7d245db980fb5e018d8851a4ab
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
41B
MD55f6a7de9052ca7659b838a40c6085571
SHA13810efa06ade76e609e525a9fc59d4227da43c6b
SHA256ce5b7c56696824dd599baddf17a437c6bcff91bb63d2cb6a13974e81abc4d825
SHA512f8c42c4cd8e5be8f53bec871675294cdbf1180e581bc42fb867e732b05e573a4926e057906739462a49f78c999f84ed4c3448fd226dd1ebe47611eb98c4c32dd