General
-
Target
Phone-Poisk (4).apk
-
Size
3.7MB
-
Sample
241031-hxyv6avjeq
-
MD5
6f3afc9c0af9b67a7c15ff10f8fe48d0
-
SHA1
54e8b99dd99a6fc0b90bb79018697dac7ac33efb
-
SHA256
c6332488e93567ca53456647129e50f75f68c36b1a71d98007615ab8d24f83a6
-
SHA512
9237c10221ef0ed1b418d4418956d2b835648eff48de8686f2b3fe385d91833ecbbdad51aaeacee2011d2f1bf359498aade0bf1e66591ca355e2100da91ff025
-
SSDEEP
49152:c6Z0+SLA+opMCZymO9Ve+ge+ihVDamzDzdGGxQTOqVUBYqv0cg4cBrikoJS:c03p9ZyzEebvDamzDzBeTW0t4ciJS
Behavioral task
behavioral1
Sample
Phone-Poisk (4).apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
193.233.254.67:7777
Targets
-
-
Target
Phone-Poisk (4).apk
-
Size
3.7MB
-
MD5
6f3afc9c0af9b67a7c15ff10f8fe48d0
-
SHA1
54e8b99dd99a6fc0b90bb79018697dac7ac33efb
-
SHA256
c6332488e93567ca53456647129e50f75f68c36b1a71d98007615ab8d24f83a6
-
SHA512
9237c10221ef0ed1b418d4418956d2b835648eff48de8686f2b3fe385d91833ecbbdad51aaeacee2011d2f1bf359498aade0bf1e66591ca355e2100da91ff025
-
SSDEEP
49152:c6Z0+SLA+opMCZymO9Ve+ge+ihVDamzDzdGGxQTOqVUBYqv0cg4cBrikoJS:c03p9ZyzEebvDamzDzBeTW0t4ciJS
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1