General
-
Target
Phone-Poisk (2).apk
-
Size
3.8MB
-
Sample
241031-g3lmcatlcl
-
MD5
bb9da161cfa71608b81807515e26aa45
-
SHA1
be40ceb2377b747dea41068b87940f0bd455a07d
-
SHA256
b856b0f127ba793f3674649c86b85e8e2641087b1103cb5cda27e8f27f8bfee1
-
SHA512
4b16a2b276e5b96f80845c7490fc8738403dbe7c292a71bde3d31b5a985ee6a0a9e7617a2438251e3b311ba93ff0df7b505754707f235460c95dc6805ebc13f4
-
SSDEEP
98304:8iZP7X9Mr7tMLsd7gE6mmzxzBPTB0txyOzu:8ixXur60gE6RzXelu
Behavioral task
behavioral1
Sample
Phone-Poisk (2).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Phone-Poisk (2).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Phone-Poisk (2).apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
109.107.182.213:7771
Targets
-
-
Target
Phone-Poisk (2).apk
-
Size
3.8MB
-
MD5
bb9da161cfa71608b81807515e26aa45
-
SHA1
be40ceb2377b747dea41068b87940f0bd455a07d
-
SHA256
b856b0f127ba793f3674649c86b85e8e2641087b1103cb5cda27e8f27f8bfee1
-
SHA512
4b16a2b276e5b96f80845c7490fc8738403dbe7c292a71bde3d31b5a985ee6a0a9e7617a2438251e3b311ba93ff0df7b505754707f235460c95dc6805ebc13f4
-
SSDEEP
98304:8iZP7X9Mr7tMLsd7gE6mmzxzBPTB0txyOzu:8ixXur60gE6RzXelu
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1