General
-
Target
Predator (4).apk
-
Size
5.4MB
-
Sample
241030-2g62dasfpp
-
MD5
46352504b375c5b0c31eaaf038442104
-
SHA1
05ae792b90b36e77b2338861350aa0299239cd1a
-
SHA256
4691e2ff1044fb50d0287260f89002ee88d4b6bc202248a6205f78bba94825c9
-
SHA512
deb24d6000bc8e74938a2b636f12bc87e2c8e2c79c907d351d2c07855a4c3b300be925b6d8199f4d66c99cd587051341f3e860aedc899f092e371bc565daf4b5
-
SSDEEP
98304:9aLG78St6MJvmzVT7L0tQzBNDbRZQ/M/AqZX6wNdMKMgQZ/w0rvNfG9Le04WqzeT:9v78HMJ+zV4xG9icqaRMg0iFF3
Static task
static1
Behavioral task
behavioral1
Sample
Predator (4).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator (4).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator (4).apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
89.238.177.28:7744
Targets
-
-
Target
Predator (4).apk
-
Size
5.4MB
-
MD5
46352504b375c5b0c31eaaf038442104
-
SHA1
05ae792b90b36e77b2338861350aa0299239cd1a
-
SHA256
4691e2ff1044fb50d0287260f89002ee88d4b6bc202248a6205f78bba94825c9
-
SHA512
deb24d6000bc8e74938a2b636f12bc87e2c8e2c79c907d351d2c07855a4c3b300be925b6d8199f4d66c99cd587051341f3e860aedc899f092e371bc565daf4b5
-
SSDEEP
98304:9aLG78St6MJvmzVT7L0tQzBNDbRZQ/M/AqZX6wNdMKMgQZ/w0rvNfG9Le04WqzeT:9v78HMJ+zV4xG9icqaRMg0iFF3
-
Spynote family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1