Analysis
-
max time kernel
119s -
max time network
105s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
30/10/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
Predator..apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator..apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator..apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Predator..apk
-
Size
5.4MB
-
MD5
1d6981826bf25d9bbe4e4ff2a5954df0
-
SHA1
23237c1b3a0cd807a958c5e600a54e18ea60abb5
-
SHA256
41020ab0991a8cb17d6be95e80b96ea65e5694b128ef807b223305bef779e56e
-
SHA512
f148a4ee83152a22cb7cb73563294763d12de2d040085fdc4d366404abe5a828f6af230d78d78acee0f1f7a897919928378d183059ff240c2b069607563f4e57
-
SSDEEP
98304:NZySOqmzlTS0tAzBLdblZQ/0/goHgQ2edJFA8C6ZTqNNB8KMgQZ/g0rvNE:NTuzlRboHgQDd3+
Malware Config
Extracted
spynote
89.238.177.28:7744
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
pid Process 4262 wn.beaches.keen -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/wn.beaches.keen/app_DynamicOptDex/sUawf.json 4288 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/wn.beaches.keen/app_DynamicOptDex/sUawf.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/wn.beaches.keen/app_DynamicOptDex/oat/x86/sUawf.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/wn.beaches.keen/app_DynamicOptDex/sUawf.json 4262 wn.beaches.keen -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText wn.beaches.keen Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId wn.beaches.keen -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock wn.beaches.keen -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground wn.beaches.keen -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS wn.beaches.keen -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver wn.beaches.keen -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule wn.beaches.keen
Processes
-
wn.beaches.keen1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4262 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/wn.beaches.keen/app_DynamicOptDex/sUawf.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/wn.beaches.keen/app_DynamicOptDex/oat/x86/sUawf.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4288
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5078df0840cb0bd8cf27f46bbeac41181
SHA1228432c1445ab551eeef5886ace224ef966aed31
SHA256f14af95d683726b57a77de430ed17303efc27fee6903558a017f167f9b9ba656
SHA5121ccb5dff3e2c6b8f336b3d2881352c7af33bc74564c670a334b4cf1e90d119b0eb92efe4ee3c8bdcce9829d48cb8a7fbee02bc55e7b957aa85c032ee49e816e5
-
Filesize
1.8MB
MD534c7d516b382c305ac2355004627aefd
SHA1057d9c86b097987637dbbe6bdc3d41f7b4d520ad
SHA256702007fef066c04ed981255beef834d6820ce80b38cf1ed02aaed2fcd6214b69
SHA512b17138d3e5f4ad93870a12c784a4480654870b88ce8e92c16c54147e3958b7a64a33f8b6f1175efe2cf5acbecc3669b4dc116dece6fb3eefd55aa42ea4cd3cb3
-
Filesize
4.0MB
MD52f4b336a329a7f1df7903615ce96b83c
SHA1643bf150982040803c1142221b1ae909574da131
SHA256975ace66f760d143fc1bdea9014c30713c5e80652b46c699be25ff5343e8bfb5
SHA512c138366bef18d1eae6e4f8ec2bd5fee5db7a745d172812bdcf7325f72ad87247ddad60a68e0cd75bb4972a68dd3f3421e84fbb2d88f2c3b0ea76764c95ffb625
-
Filesize
4.0MB
MD55bbc74db9c19bd16dbbd4e0967a6904e
SHA13572fc02e2a9f13ca3ae92c7a6669192ed1af1ac
SHA2562fa070dc23de44c0ffd8f8794d78481c2cd0c45dc754c780ededad22c63ddb66
SHA51208778904d448dbe8baa81d63ba6a96fb76d117aaf0a40f2afa71af67d3b95029e8b81d5481d729926ee9522a0a7a9dfe04711569ad58e1e3bca662035aa5846f
-
Filesize
276B
MD5e7e9c7a49020b4ebc24819abec62d494
SHA19716a577183408e5aba4537ca1179c7e289003e8
SHA256cae0e415be321e6117d09446649157d2421a8cfc7f452b3fcee003002f2e8a0f
SHA512fb1ff0343be54569f849ca653ab4faf29b05d5c5d186089cd1e12102dfd0f0dbbd54c51747c6a03796eb2ed7ad34a464cac80e0da7cc4c904148afcf9d26c3b5
-
Filesize
25B
MD503adce49cb7546004e5761dd89915575
SHA12cc7f4c57f252ab791246854c758f5e165138752
SHA2561f0f62e5bfefe0c6eda59dd97f31c01bd5ec83af54c63e744cfc17b42f837c88
SHA5123f7601ba6f4224c0b9f9277b35d26d2cfff83f2bbc8bf567c94d168cc0a5442b80669572c41c182397b2722e825da89a76f501f8b7a8d9b577a9376ba2660c4d
-
Filesize
25B
MD5749af3b8d53606c7777359dff271710a
SHA138c222bd446af5f06b689e6d1edb6be053dc1918
SHA256507d4a875476633d215eb27e67af2b56c3b12b3403328781850508da7c17a5af
SHA5121bf956585a5d3c2b246e2f4b05292d28776172257599d71f246404b8124450be8a110b37111f929d1717c8bcb414c99ccb490d98f192b7e6e31dfde7c2bacccc
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e