General

  • Target

    Predator....apk

  • Size

    5.4MB

  • Sample

    241030-2waxgstrcr

  • MD5

    310b83646c7f937ff0e8cfbc1133dca3

  • SHA1

    030bda90a9ef495752b173f9250929faa58df05e

  • SHA256

    287ecac9a9ca0aaff9131a1cede12032ac0791d83edc3599017a7eb7801e2405

  • SHA512

    baa6721f56dfd4173b97dac31621da826afcc83d3cd6ccd7da421a5a0fb9b932ce72a575e1d01ad70a82d606faf057905417af543b8ad3788fde3f233000d653

  • SSDEEP

    98304:oCQg83liGOmzlTbL0tgzBVhbKVhW6y+J6tBiMYNWgwZQ/M/AaZPqo918KMgQZ/gy:oCiiGJzl4BVhWD+JIBANWgV

Malware Config

Extracted

Family

spynote

C2

89.238.177.28:7744

Targets

    • Target

      Predator....apk

    • Size

      5.4MB

    • MD5

      310b83646c7f937ff0e8cfbc1133dca3

    • SHA1

      030bda90a9ef495752b173f9250929faa58df05e

    • SHA256

      287ecac9a9ca0aaff9131a1cede12032ac0791d83edc3599017a7eb7801e2405

    • SHA512

      baa6721f56dfd4173b97dac31621da826afcc83d3cd6ccd7da421a5a0fb9b932ce72a575e1d01ad70a82d606faf057905417af543b8ad3788fde3f233000d653

    • SSDEEP

      98304:oCQg83liGOmzlTbL0tgzBVhbKVhW6y+J6tBiMYNWgwZQ/M/AaZPqo918KMgQZ/gy:oCiiGJzl4BVhWD+JIBANWgV

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks