Analysis
-
max time kernel
7s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
12-11-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
AEMET_546.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
AEMET_546.apk
Resource
android-x64-20240624-en
General
-
Target
AEMET_546.apk
-
Size
8.8MB
-
MD5
989063f16a666ad17d7e09e92f55b2f7
-
SHA1
51f835e73483de82708133666136f1cdd3edd536
-
SHA256
96d921e36981c3b83e0edb417f11966bfe2506b4b0d7c4cdbbbe797997214400
-
SHA512
c75fbb632f91ad296399560e1caf2cae0a9802075f636b971e7c1eadf7c202055fe5fa1282dff94bce08efef072299541c8a18912b328b618235c386ed958619
-
SSDEEP
196608:P9QjYbPF7R67Wz+1hyUtF+RDt5DhztlSFmWi1uI2Th5:P9QqPeKz+1hTF+RJ5dzDScfuI2/
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Spynote payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_spynote -
Attempts to obfuscate APK file format
Applies obfuscation techniques to the APK format in order to hinder analysis
-
Declares broadcast receivers with permission to handle system events 1 IoCs
description ioc Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN -
Declares services with permission to bind to the system 3 IoCs
description ioc Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE Required by VPN services to bind with the system. Allows apps to provision VPN services. android.permission.BIND_VPN_SERVICE Required by input method services to bind with the system. Allows apps to provide custom input methods (keyboards). android.permission.BIND_INPUT_METHOD -
Requests dangerous framework permissions 15 IoCs
description ioc Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to read the user's call log. android.permission.READ_CALL_LOG Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS Required to be able to access the camera device. android.permission.CAMERA Allows an application to record audio. android.permission.RECORD_AUDIO Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal operation.surprise.sequel
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.2MB
MD52a196f72ec81faa752957f81222dbe3d
SHA1ca3c451c697be9b31b0301632a4c61279a16473e
SHA256d9e7c484d439cfa181ff9a14aabcc4117b48bb0232e39d5abf93d114210d0130
SHA512c9aa805f1be1004b414d8cbcb7791501c1b716c0146c08d2323f1321570986ec1f28c33fe66c48a5aec3d3ade5d11ba152d9f7f45fd4f480a7787e1035e63d1e
-
Filesize
7.4MB
MD5e5de67d62143871aaed948808cc4d5a1
SHA1f134919f2b6482cfb0017cfc8ea6d7b5c8e0b1e0
SHA2567da283f0e155e0971e75a229c690f7c9efb32472c329c6f4cbd855a4ed6954a8
SHA51228e519c96cc57e8419c1415f8006a93cd597c8e5549ad14826d3d2f47a9a1669358f5cbb4b92b93009326a386e24f208838159f2e7f63fa8fc23f91193b5d087
-
Filesize
8.2MB
MD51f32523443ded31f3087085d2376201a
SHA1095dae411b66727c9964b5bc15c99f0f188eb102
SHA25612586176838a04b1ac596888932c0c15d5d14b5356085225d2d0726c50a58fbb
SHA51294884a41b0a308619817b529f5ea35ee13e862134d5f59fd5569731eecee17493e84e15cd8a01195e0ae889fe20e46c4bc111ceddc604946043ebb1df59e7592
-
Filesize
8.6MB
MD543879af2c71ce53e2c6491c2e958b754
SHA106c7991ad442d2eb7ac0adf3438ca4b205f5ad21
SHA256d405c4e20296f1ecaac33fb7f7b7a4a0f9e2df36d185043960826cf89e38b754
SHA512f3a9eae742772e8161909ffc94a36d3175bcac42ecdb9288ae323591d337c1d6bc0955f5b0fab2222e00ebb68f09b95851eb50b0a9bc47951446be9127cc4055
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99