General

  • Target

    ready_Dropper.apk

  • Size

    6.5MB

  • Sample

    241027-mbzmsawgmd

  • MD5

    03e3b79dbeb504ae75b1aa1ef9667a25

  • SHA1

    c1f8b981a980e4310911a7e84eef4261f6a1a77b

  • SHA256

    760b4865a6f5e793641c58ab938e3b136ffb3690f725bf0b590c3ee892f311f3

  • SHA512

    446c40e433fdb0289ecb3898335020d6125e0b6ea21a4bd7265d7e1b6075e87044431ceb3911e84bbfe2af306c0ae2507ac876b160929a5387eee7237e31b54e

  • SSDEEP

    98304:z1bjHHCcbuxlATLLGuZvmd9fswjbrucGwNGErukpLGiCsmzQzBmTy0tJios:JbjnC8uLkvfZvmf0SRX/5jC7ztxS

Malware Config

Extracted

Family

spynote

C2

bush-advance.gl.at.ply.gg:33628

Targets

    • Target

      childapp.apk

    • Size

      3.8MB

    • MD5

      dbd9d25771312b5773ad910e73651792

    • SHA1

      9f15ab54c2f26fc50b2046932d483e3024106521

    • SHA256

      1694477091c49280b11484ad2c29a7f2d50b0261941ee573209640333a417efb

    • SHA512

      34be0ec133c1059d94ee6afc8139db5194ea7486f0c74a6e3306a957889bfa204a2bfb1307a0110cd01606afba204b269d00344e0cf1ba323bd624bf2e38ceeb

    • SSDEEP

      98304:KfswjbrucGwNGErukpLGiCsmzQzBmTy0tJio/:K0SRX/5jC7ztx1

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks