Analysis
-
max time kernel
119s -
max time network
119s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
30/10/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
Predator...apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator...apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator...apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Predator...apk
-
Size
5.4MB
-
MD5
9213e81f0c9fc7061e8a560fd776f16d
-
SHA1
7527b1ef111f1ef5a27f94ed7839f18528f9d39d
-
SHA256
aca693e404b51a44e355fa3b02b0c5a7421cbc477245f33bde1f9645d0d4fc77
-
SHA512
4b2f7ff21845e39405f9cb6a614a05c4fa1b8e9f9e8a3fc814190331b275015edcb07cd889e9f3aa33f6e398a363b342cefdcac960fa555d0787fcb6891df900
-
SSDEEP
98304:bDWlU6ZP3mztTM0tYzBN2db+Z9/fp7ymUu8JF3P7ZQ/A/Y+ZZajtjsKMgQZ/Q0rf:bDWikWztf3iruFxr
Malware Config
Extracted
spynote
89.238.177.28:7744
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
pid Process 4462 wn.beaches.keen -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/wn.beaches.keen/app_DynamicOptDex/sM.json 4462 wn.beaches.keen -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId wn.beaches.keen -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock wn.beaches.keen -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground wn.beaches.keen -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction wn.beaches.keen -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS wn.beaches.keen -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule wn.beaches.keen
Processes
-
wn.beaches.keen1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4462
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5b6efa0145035861da992d2b8edc7f6c7
SHA17dccc85ef199d3347d6df2638846b765f2c98690
SHA25606d2fee30f2e2206328eb00cc94103eca1b30ae252a095499135c7d778803fc9
SHA512dafd10ef0e53a81f10489907011a76e9ecb3cc5eaf9fae41d60b8b0ce62ee1a137a3e9e01c0df3c0943d7c499a59d77d55e248e7b21b2087454451ba5308461b
-
Filesize
1.8MB
MD521048a73dc1f0cbeacf2f5ac55f861ad
SHA19f47b7b478b54ea8aa3710c2bfb43c040e697a41
SHA2567863c7967eb15ef351d59e1e1eb68aac0a495016bce5a1175bb2c622a61b6408
SHA512c22c868fb44f8f4fc7cbaf0a3d1f6abc4044960a27ffd60986a54fca68ed45443dcb65e3606bfb16397d43e8499cd36a5a3e5fc7bd0c0664f94e23d0d830d75d
-
Filesize
4.0MB
MD55bbc74db9c19bd16dbbd4e0967a6904e
SHA13572fc02e2a9f13ca3ae92c7a6669192ed1af1ac
SHA2562fa070dc23de44c0ffd8f8794d78481c2cd0c45dc754c780ededad22c63ddb66
SHA51208778904d448dbe8baa81d63ba6a96fb76d117aaf0a40f2afa71af67d3b95029e8b81d5481d729926ee9522a0a7a9dfe04711569ad58e1e3bca662035aa5846f
-
Filesize
25B
MD503adce49cb7546004e5761dd89915575
SHA12cc7f4c57f252ab791246854c758f5e165138752
SHA2561f0f62e5bfefe0c6eda59dd97f31c01bd5ec83af54c63e744cfc17b42f837c88
SHA5123f7601ba6f4224c0b9f9277b35d26d2cfff83f2bbc8bf567c94d168cc0a5442b80669572c41c182397b2722e825da89a76f501f8b7a8d9b577a9376ba2660c4d
-
Filesize
25B
MD5749af3b8d53606c7777359dff271710a
SHA138c222bd446af5f06b689e6d1edb6be053dc1918
SHA256507d4a875476633d215eb27e67af2b56c3b12b3403328781850508da7c17a5af
SHA5121bf956585a5d3c2b246e2f4b05292d28776172257599d71f246404b8124450be8a110b37111f929d1717c8bcb414c99ccb490d98f192b7e6e31dfde7c2bacccc
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
276B
MD518a8d61a22cb921aa41444e4515d131f
SHA1ea10a6933b72d3ac197da35297922bf727a374ad
SHA256ff24f002fdf47a00e694d915ab4ea2150c2113a06f61400267d6051a8877cdd9
SHA5124f5b3be6b1e18a1ae68e9db5ed21244572216b506dc9b3b8e5936daa4418e7db11de67237e0bc349010f9e1316421ef3fd837dda91f282488ecdb53dc7355049