General
-
Target
Poisk-Phone.apk
-
Size
3.7MB
-
Sample
241031-h2rbwatbjb
-
MD5
7e9837ebdbc8d7a06ae173464ef93c64
-
SHA1
a8a2bfc9193160024f283b95933d969505223a15
-
SHA256
c33deb1d25b66f2471ca0a9fcd534a7d0c5f87cc103b2f9793615176c69aa71e
-
SHA512
4f1401d24fc89e989fb38f9e103b0501538451e6e084c0e7c045d77d740172ed9bbf4289a6f2cc327d70043bb142aa513214d48247e9d551449d181125416420
-
SSDEEP
49152:6f89W2GOEzzrqIU543qhOEEIGDnbig+mzHzdGGEQTOTuU+Yq00cgwtx1dbik1MCt:73czXqIUuE8jGg+mzHzBTTY0twtrj
Behavioral task
behavioral1
Sample
Poisk-Phone.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
109.107.182.213:7771
Targets
-
-
Target
Poisk-Phone.apk
-
Size
3.7MB
-
MD5
7e9837ebdbc8d7a06ae173464ef93c64
-
SHA1
a8a2bfc9193160024f283b95933d969505223a15
-
SHA256
c33deb1d25b66f2471ca0a9fcd534a7d0c5f87cc103b2f9793615176c69aa71e
-
SHA512
4f1401d24fc89e989fb38f9e103b0501538451e6e084c0e7c045d77d740172ed9bbf4289a6f2cc327d70043bb142aa513214d48247e9d551449d181125416420
-
SSDEEP
49152:6f89W2GOEzzrqIU543qhOEEIGDnbig+mzHzdGGEQTOTuU+Yq00cgwtx1dbik1MCt:73czXqIUuE8jGg+mzHzBTTY0twtrj
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1