General
-
Target
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.zip
-
Size
1.9MB
-
Sample
241106-cwdkyaslgw
-
MD5
9136721b5fa07efb8f326eca03e7534e
-
SHA1
0c93e6264aa644347f4d1166a97139268b88c875
-
SHA256
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c
-
SHA512
fae73b9431df9ba4d73b7a2e585e9c393e00e2d09f7faea42f0eda63397fa9ee9742cae78e5b075a576fc883fefd3c1718d7a20979ebea90bb9e697a2230430d
-
SSDEEP
12288:5GHQyuFIRTgMWb0hLeZ3ob5OuM5WrFFMK1YnU/:j3IRTgMWELeCb5OujMK1uU/
Behavioral task
behavioral1
Sample
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
192.168.1.36:8080
Extracted
spynote
192.168.1.36:8080
Targets
-
-
Target
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c.zip
-
Size
1.9MB
-
MD5
9136721b5fa07efb8f326eca03e7534e
-
SHA1
0c93e6264aa644347f4d1166a97139268b88c875
-
SHA256
33be0d70b080e48f4dfb63a0e36c81633cdd4c767ebcd462f1b1515f494a2e1c
-
SHA512
fae73b9431df9ba4d73b7a2e585e9c393e00e2d09f7faea42f0eda63397fa9ee9742cae78e5b075a576fc883fefd3c1718d7a20979ebea90bb9e697a2230430d
-
SSDEEP
12288:5GHQyuFIRTgMWb0hLeZ3ob5OuM5WrFFMK1YnU/:j3IRTgMWELeCb5OujMK1uU/
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1