Analysis Overview
SHA256
1841e8606b464685bb24440f01b96a0d8b7d310654e6c14b6418e93a16d12c52
Threat Level: Known bad
The file ready_1.apk was found to be: Known bad.
Malicious Activity Summary
Spynote payload
Spynote family
Removes its main activity from the application launcher
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Makes use of the framework's Accessibility service
Acquires the wake lock
Requests dangerous framework permissions
Requests disabling of battery optimizations (often used to enable hiding in the background).
Declares services with permission to bind to the system
Makes use of the framework's foreground persistence service
Performs UI accessibility actions on behalf of the user
Declares broadcast receivers with permission to handle system events
Attempts to obfuscate APK file format
Queries information about active data network
Schedules tasks to execute at a specified time
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-10-31 07:48
Signatures
Spynote family
Spynote payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Attempts to obfuscate APK file format
Declares broadcast receivers with permission to handle system events
| Description | Indicator | Process | Target |
| Required by device admin receivers to bind with the system. Allows apps to manage device administration features. | android.permission.BIND_DEVICE_ADMIN | N/A | N/A |
Declares services with permission to bind to the system
| Description | Indicator | Process | Target |
| Required by accessibility services to bind with the system. Allows apps to access accessibility features. | android.permission.BIND_ACCESSIBILITY_SERVICE | N/A | N/A |
| Required by VPN services to bind with the system. Allows apps to provision VPN services. | android.permission.BIND_VPN_SERVICE | N/A | N/A |
| Required by input method services to bind with the system. Allows apps to provide custom input methods (keyboards). | android.permission.BIND_INPUT_METHOD | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Required to be able to access the camera device. | android.permission.CAMERA | N/A | N/A |
| Allows an application to record audio. | android.permission.RECORD_AUDIO | N/A | N/A |
| Allows an application to read from external storage. | android.permission.READ_EXTERNAL_STORAGE | N/A | N/A |
| Allows an application to write to external storage. | android.permission.WRITE_EXTERNAL_STORAGE | N/A | N/A |
| Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. | android.permission.SYSTEM_ALERT_WINDOW | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an application to request installing packages. | android.permission.REQUEST_INSTALL_PACKAGES | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-10-31 07:45
Reported
2024-10-31 07:50
Platform
android-x64-arm64-20240624-en
Max time kernel
59s
Max time network
67s
Command Line
Signatures
Removes its main activity from the application launcher
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Makes use of the framework's Accessibility service
| Description | Indicator | Process | Target |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId | N/A | N/A |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId | N/A | N/A |
| Framework service call | android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText | N/A | N/A |
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Makes use of the framework's foreground persistence service
| Description | Indicator | Process | Target |
| Framework service call | android.app.IActivityManager.setServiceForeground | N/A | N/A |
Performs UI accessibility actions on behalf of the user
| Description | Indicator | Process | Target |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
| N/A | android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction | N/A | N/A |
Queries information about active data network
| Description | Indicator | Process | Target |
| Framework service call | android.net.IConnectivityManager.getActiveNetworkInfo | N/A | N/A |
Requests disabling of battery optimizations (often used to enable hiding in the background).
| Description | Indicator | Process | Target |
| Intent action | android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS | N/A | N/A |
Schedules tasks to execute at a specified time
| Description | Indicator | Process | Target |
| Framework service call | android.app.job.IJobScheduler.schedule | N/A | N/A |
Processes
mess.mcdonald.contests
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 172.217.169.42:443 | tcp | |
| GB | 172.217.169.42:443 | tcp | |
| GB | 172.217.16.238:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.179.238:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.212.232:443 | ssl.google-analytics.com | tcp |
| DE | 193.233.254.67:7777 | tcp | |
| GB | 142.250.187.196:443 | tcp | |
| GB | 142.250.187.196:443 | tcp |
Files
/storage/emulated/0/Config/sys/apps/log/log-2024-10-31.txt
| MD5 | ea2cd29c192da6b91c2d9c5ab7871659 |
| SHA1 | fbc2f5f7cba4581aa7788645826fc56b542f88e8 |
| SHA256 | f33d22e972838b1c4322a0bd77e1b0abe1b1a01bec7454fac71a698154749301 |
| SHA512 | 7078fa705af06cff9072101120e9c6ff7454785bd564cafeb6f15825c3373887154a6ab2a18d2823ce0fc1d042d04de6aad87e7f682f246ca498b2fe5cf8cdfa |
/storage/emulated/0/Config/sys/apps/log/log-2024-10-31.txt
| MD5 | ba30336bf53d54ed3c0ea69dd545de8c |
| SHA1 | ce99c6724c75b93b7448e2d9fac16ca702a5711f |
| SHA256 | 2d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af |
| SHA512 | eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e |
/storage/emulated/0/Config/sys/apps/log/log-2024-10-31.txt
| MD5 | 0fe2175cebbfa5838ba9aedd873e3f62 |
| SHA1 | 3657f5418c8499df9ffe7121b98f535103ac451c |
| SHA256 | 112c4edbd77fe022d3f8276dd856f290fa1956de23fa146384382a49b274cd6e |
| SHA512 | 60d3903724554d4fd8146059ac50e5cccee33c250f561adfd6e6e9b1dd6e1ffbc37b62cb698880e2acc74c6af71cebcc2472260e5897163924b76b0c65a25497 |
/storage/emulated/0/Config/sys/apps/log/log-2024-10-31.txt
| MD5 | 3af69119804d1d999d56d230338ffd36 |
| SHA1 | 69350826205583c8acc385ee0a6e3fc2673ee2ca |
| SHA256 | 10994862cb263ab6b1e4428cc24cc9c585458fc67544fe0f5dfea81a5a7a115c |
| SHA512 | 4a41b19d28f637b397d9dff225621694c44c750a9bd65f3e6ad5d3b9acf0d118910ddf53d4618213f9e14c61e0fb154f33f2747dd3b8d50459990767f42fc8cb |