General
-
Target
Predator...apk
-
Size
5.4MB
-
Sample
241030-218djsvjdn
-
MD5
9213e81f0c9fc7061e8a560fd776f16d
-
SHA1
7527b1ef111f1ef5a27f94ed7839f18528f9d39d
-
SHA256
aca693e404b51a44e355fa3b02b0c5a7421cbc477245f33bde1f9645d0d4fc77
-
SHA512
4b2f7ff21845e39405f9cb6a614a05c4fa1b8e9f9e8a3fc814190331b275015edcb07cd889e9f3aa33f6e398a363b342cefdcac960fa555d0787fcb6891df900
-
SSDEEP
98304:bDWlU6ZP3mztTM0tYzBN2db+Z9/fp7ymUu8JF3P7ZQ/A/Y+ZZajtjsKMgQZ/Q0rf:bDWikWztf3iruFxr
Static task
static1
Behavioral task
behavioral1
Sample
Predator...apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator...apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator...apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
89.238.177.28:7744
Targets
-
-
Target
Predator...apk
-
Size
5.4MB
-
MD5
9213e81f0c9fc7061e8a560fd776f16d
-
SHA1
7527b1ef111f1ef5a27f94ed7839f18528f9d39d
-
SHA256
aca693e404b51a44e355fa3b02b0c5a7421cbc477245f33bde1f9645d0d4fc77
-
SHA512
4b2f7ff21845e39405f9cb6a614a05c4fa1b8e9f9e8a3fc814190331b275015edcb07cd889e9f3aa33f6e398a363b342cefdcac960fa555d0787fcb6891df900
-
SSDEEP
98304:bDWlU6ZP3mztTM0tYzBN2db+Z9/fp7ymUu8JF3P7ZQ/A/Y+ZZajtjsKMgQZ/Q0rf:bDWikWztf3iruFxr
-
Spynote family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1