Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    30/10/2024, 23:04

General

  • Target

    Predator...apk

  • Size

    5.4MB

  • MD5

    9213e81f0c9fc7061e8a560fd776f16d

  • SHA1

    7527b1ef111f1ef5a27f94ed7839f18528f9d39d

  • SHA256

    aca693e404b51a44e355fa3b02b0c5a7421cbc477245f33bde1f9645d0d4fc77

  • SHA512

    4b2f7ff21845e39405f9cb6a614a05c4fa1b8e9f9e8a3fc814190331b275015edcb07cd889e9f3aa33f6e398a363b342cefdcac960fa555d0787fcb6891df900

  • SSDEEP

    98304:bDWlU6ZP3mztTM0tYzBN2db+Z9/fp7ymUu8JF3P7ZQ/A/Y+ZZajtjsKMgQZ/Q0rf:bDWikWztf3iruFxr

Malware Config

Extracted

Family

spynote

C2

89.238.177.28:7744

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Spynote family
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • wn.beaches.keen
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4462

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json

    Filesize

    1.8MB

    MD5

    b6efa0145035861da992d2b8edc7f6c7

    SHA1

    7dccc85ef199d3347d6df2638846b765f2c98690

    SHA256

    06d2fee30f2e2206328eb00cc94103eca1b30ae252a095499135c7d778803fc9

    SHA512

    dafd10ef0e53a81f10489907011a76e9ecb3cc5eaf9fae41d60b8b0ce62ee1a137a3e9e01c0df3c0943d7c499a59d77d55e248e7b21b2087454451ba5308461b

  • /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json

    Filesize

    1.8MB

    MD5

    21048a73dc1f0cbeacf2f5ac55f861ad

    SHA1

    9f47b7b478b54ea8aa3710c2bfb43c040e697a41

    SHA256

    7863c7967eb15ef351d59e1e1eb68aac0a495016bce5a1175bb2c622a61b6408

    SHA512

    c22c868fb44f8f4fc7cbaf0a3d1f6abc4044960a27ffd60986a54fca68ed45443dcb65e3606bfb16397d43e8499cd36a5a3e5fc7bd0c0664f94e23d0d830d75d

  • /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json

    Filesize

    4.0MB

    MD5

    5bbc74db9c19bd16dbbd4e0967a6904e

    SHA1

    3572fc02e2a9f13ca3ae92c7a6669192ed1af1ac

    SHA256

    2fa070dc23de44c0ffd8f8794d78481c2cd0c45dc754c780ededad22c63ddb66

    SHA512

    08778904d448dbe8baa81d63ba6a96fb76d117aaf0a40f2afa71af67d3b95029e8b81d5481d729926ee9522a0a7a9dfe04711569ad58e1e3bca662035aa5846f

  • /storage/emulated/0/Config/sys/apps/log/log-2024-10-30.txt

    Filesize

    25B

    MD5

    03adce49cb7546004e5761dd89915575

    SHA1

    2cc7f4c57f252ab791246854c758f5e165138752

    SHA256

    1f0f62e5bfefe0c6eda59dd97f31c01bd5ec83af54c63e744cfc17b42f837c88

    SHA512

    3f7601ba6f4224c0b9f9277b35d26d2cfff83f2bbc8bf567c94d168cc0a5442b80669572c41c182397b2722e825da89a76f501f8b7a8d9b577a9376ba2660c4d

  • /storage/emulated/0/Config/sys/apps/log/log-2024-10-30.txt

    Filesize

    25B

    MD5

    749af3b8d53606c7777359dff271710a

    SHA1

    38c222bd446af5f06b689e6d1edb6be053dc1918

    SHA256

    507d4a875476633d215eb27e67af2b56c3b12b3403328781850508da7c17a5af

    SHA512

    1bf956585a5d3c2b246e2f4b05292d28776172257599d71f246404b8124450be8a110b37111f929d1717c8bcb414c99ccb490d98f192b7e6e31dfde7c2bacccc

  • /storage/emulated/0/Config/sys/apps/log/log-2024-10-30.txt

    Filesize

    25B

    MD5

    ba30336bf53d54ed3c0ea69dd545de8c

    SHA1

    ce99c6724c75b93b7448e2d9fac16ca702a5711f

    SHA256

    2d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af

    SHA512

    eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e

  • /storage/emulated/0/Config/sys/apps/log/log-2024-10-30.txt

    Filesize

    276B

    MD5

    18a8d61a22cb921aa41444e4515d131f

    SHA1

    ea10a6933b72d3ac197da35297922bf727a374ad

    SHA256

    ff24f002fdf47a00e694d915ab4ea2150c2113a06f61400267d6051a8877cdd9

    SHA512

    4f5b3be6b1e18a1ae68e9db5ed21244572216b506dc9b3b8e5936daa4418e7db11de67237e0bc349010f9e1316421ef3fd837dda91f282488ecdb53dc7355049