General

  • Target

    ready (7).apk

  • Size

    3.7MB

  • Sample

    241031-e7fksaymdt

  • MD5

    ddb241224a2ba5daea0b892cb7448259

  • SHA1

    885d1f3d3e52036a791baa8b3125bd6673c56c2b

  • SHA256

    d0f880569e9517b0d74c20e177ed4fd70ee5130302da4cedd83cb4f060b386b7

  • SHA512

    923f4d7511b08f2c52a4a58b3cf605409a2bcf0cb54f70af4315fd9c6265026d6a28318272073ef343e473dc58eb697277e6eb3a2e03a2d2cdc7459e77c9b673

  • SSDEEP

    98304:d49InxuvZXOSJ23CTodwLSmzbzBcTO0tMdk5G:eInodv23CTodwLdz21G

Malware Config

Extracted

Family

spynote

C2

193.233.254.67:7777

Targets

    • Target

      ready (7).apk

    • Size

      3.7MB

    • MD5

      ddb241224a2ba5daea0b892cb7448259

    • SHA1

      885d1f3d3e52036a791baa8b3125bd6673c56c2b

    • SHA256

      d0f880569e9517b0d74c20e177ed4fd70ee5130302da4cedd83cb4f060b386b7

    • SHA512

      923f4d7511b08f2c52a4a58b3cf605409a2bcf0cb54f70af4315fd9c6265026d6a28318272073ef343e473dc58eb697277e6eb3a2e03a2d2cdc7459e77c9b673

    • SSDEEP

      98304:d49InxuvZXOSJ23CTodwLSmzbzBcTO0tMdk5G:eInodv23CTodwLdz21G

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks