Analysis

  • max time kernel
    59s
  • max time network
    111s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-es
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-eslocale:es-esos:android-11-x64system
  • submitted
    08-11-2024 00:26

General

  • Target

    https://www.mediafire.com/file/apszglcaz7fkezf/Head$Trick++Paid.apk/file

Malware Config

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Spynote family
  • Spynote payload 1 IoCs
  • Attempts to obfuscate APK file format

    Applies obfuscation techniques to the APK format in order to hinder analysis

  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 3 IoCs
  • Requests dangerous framework permissions 15 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.android.chrome
    1⤵
    • Checks CPU information
    • Checks memory information
    PID:4440

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Download/.pending-1731630439-Head$Trick Paid.apk

    Filesize

    11.3MB

    MD5

    ec604cdfeda76fe8ed4039d328bf5d68

    SHA1

    54a42f63fc5daf22d702ee683ea870da56fb7fba

    SHA256

    c89cbba21e5c5e2f406ea35ccdff41ee124563e5f43c78123640c6a93de67afe

    SHA512

    6aab4ee475218d38455bd1574f2eca3d935a6e7bbbe273f12d77ec4db62916528cb22bda3f66c281c6acb5fd44af5db5c5e2d462f52764bcda2ef5515065cabf

  • /storage/emulated/0/Download/.pending-1731630439-Head$Trick Paid.apk (deleted)

    Filesize

    512KB

    MD5

    59071590099d21dd439896592338bf95

    SHA1

    6a521e1d2a632c26e53b83d2cc4b0edecfc1e68c

    SHA256

    07854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541

    SHA512

    eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668