Analysis
-
max time kernel
119s -
max time network
105s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
30/10/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
Predator...apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator...apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator...apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Predator...apk
-
Size
5.4MB
-
MD5
9213e81f0c9fc7061e8a560fd776f16d
-
SHA1
7527b1ef111f1ef5a27f94ed7839f18528f9d39d
-
SHA256
aca693e404b51a44e355fa3b02b0c5a7421cbc477245f33bde1f9645d0d4fc77
-
SHA512
4b2f7ff21845e39405f9cb6a614a05c4fa1b8e9f9e8a3fc814190331b275015edcb07cd889e9f3aa33f6e398a363b342cefdcac960fa555d0787fcb6891df900
-
SSDEEP
98304:bDWlU6ZP3mztTM0tYzBN2db+Z9/fp7ymUu8JF3P7ZQ/A/Y+ZZajtjsKMgQZ/Q0rf:bDWikWztf3iruFxr
Malware Config
Extracted
spynote
89.238.177.28:7744
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
pid Process 4248 wn.beaches.keen -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json 4274 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/wn.beaches.keen/app_DynamicOptDex/oat/x86/sM.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json 4248 wn.beaches.keen -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId wn.beaches.keen -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock wn.beaches.keen -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground wn.beaches.keen -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS wn.beaches.keen -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver wn.beaches.keen -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule wn.beaches.keen
Processes
-
wn.beaches.keen1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4248 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/wn.beaches.keen/app_DynamicOptDex/oat/x86/sM.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4274
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b6efa0145035861da992d2b8edc7f6c7
SHA17dccc85ef199d3347d6df2638846b765f2c98690
SHA25606d2fee30f2e2206328eb00cc94103eca1b30ae252a095499135c7d778803fc9
SHA512dafd10ef0e53a81f10489907011a76e9ecb3cc5eaf9fae41d60b8b0ce62ee1a137a3e9e01c0df3c0943d7c499a59d77d55e248e7b21b2087454451ba5308461b
-
Filesize
1.8MB
MD521048a73dc1f0cbeacf2f5ac55f861ad
SHA19f47b7b478b54ea8aa3710c2bfb43c040e697a41
SHA2567863c7967eb15ef351d59e1e1eb68aac0a495016bce5a1175bb2c622a61b6408
SHA512c22c868fb44f8f4fc7cbaf0a3d1f6abc4044960a27ffd60986a54fca68ed45443dcb65e3606bfb16397d43e8499cd36a5a3e5fc7bd0c0664f94e23d0d830d75d
-
Filesize
4.0MB
MD52f4b336a329a7f1df7903615ce96b83c
SHA1643bf150982040803c1142221b1ae909574da131
SHA256975ace66f760d143fc1bdea9014c30713c5e80652b46c699be25ff5343e8bfb5
SHA512c138366bef18d1eae6e4f8ec2bd5fee5db7a745d172812bdcf7325f72ad87247ddad60a68e0cd75bb4972a68dd3f3421e84fbb2d88f2c3b0ea76764c95ffb625
-
Filesize
4.0MB
MD55bbc74db9c19bd16dbbd4e0967a6904e
SHA13572fc02e2a9f13ca3ae92c7a6669192ed1af1ac
SHA2562fa070dc23de44c0ffd8f8794d78481c2cd0c45dc754c780ededad22c63ddb66
SHA51208778904d448dbe8baa81d63ba6a96fb76d117aaf0a40f2afa71af67d3b95029e8b81d5481d729926ee9522a0a7a9dfe04711569ad58e1e3bca662035aa5846f
-
Filesize
276B
MD54ef6d78c9fc241e99dd600e4fa6ebd95
SHA115dcb9d30695ce0b3e49a13cfa809721c8d65975
SHA256ae77c9153566fa4b672678c7a9ce704dc504f0f8374c94d59ddb7c37d3c2fd14
SHA5129003647344a0cd86cb6724b907f287cb28e03bc308afe0ec3ae23b14358e1a73900f54612231b58587395262481e13f58296c25a6dfa303edbfbf95878be3e33
-
Filesize
29B
MD5c9db0aece56267f06c34e62d03659b4a
SHA1e52a55ea4e5a0d30d70e90a5f5833a39370609d9
SHA256d77bace5ecc67118face00462acf4fdb6724b5a1647a37b1283e8ca8d316ed80
SHA512f8f1b07bbfe3837598288ac5935e7ad7e7ccaabbeb90b41903717a62d69a37cbbcc7a9ab63ada7b714f31a333270fd626abf40a27e26fad2a909e12a0d6468b2
-
Filesize
25B
MD5749af3b8d53606c7777359dff271710a
SHA138c222bd446af5f06b689e6d1edb6be053dc1918
SHA256507d4a875476633d215eb27e67af2b56c3b12b3403328781850508da7c17a5af
SHA5121bf956585a5d3c2b246e2f4b05292d28776172257599d71f246404b8124450be8a110b37111f929d1717c8bcb414c99ccb490d98f192b7e6e31dfde7c2bacccc
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e