Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
307s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
14/11/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
a0070974a24a222d1056de51adec816c4688d3128128ee083f4eda8a76407d58.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a0070974a24a222d1056de51adec816c4688d3128128ee083f4eda8a76407d58.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a0070974a24a222d1056de51adec816c4688d3128128ee083f4eda8a76407d58.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a0070974a24a222d1056de51adec816c4688d3128128ee083f4eda8a76407d58.apk
-
Size
5.6MB
-
MD5
6bf938c2f104c4d2bd263dbbc13f38e6
-
SHA1
9826b354f2025b2e6c4a81d5ee73f0d241bee875
-
SHA256
a0070974a24a222d1056de51adec816c4688d3128128ee083f4eda8a76407d58
-
SHA512
559ba139dca2d97a8fb22f4206a9366c4ada70516af204fcbe09af26fcc80daffd2cacb2aa2f0d341c47a722efd6d7487c2dea0d98d5af172bf9dd6092bfe9fc
-
SSDEEP
98304:TnAhTFNfoMueI3SuJnNYyaZQc+tS4ifp8agWoFkmDvWOCbc59fM:TniTF15ue4SuJ+UxtSfKagjkm6yg
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Spynote payload 1 IoCs
resource yara_rule behavioral3/files/fstream-1.dat family_spynote -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/build.ledear.bmrjo/app_apkprotector_dex/classes-v1.bin 4610 build.ledear.bmrjo /data/user/0/build.ledear.bmrjo/app_apkprotector_dex/classes-v1.bin 4610 build.ledear.bmrjo -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId build.ledear.bmrjo -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock build.ledear.bmrjo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground build.ledear.bmrjo -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS build.ledear.bmrjo -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule build.ledear.bmrjo
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5df73fd869c827cb2b84afd4973099d25
SHA1261d70e5fd5d86d1bf0c0e42056a88f0d03f7938
SHA2560fc2e5d59e0a303fbc8d50e7f40011ccd94d53e0e5d8858c02f16e173ad3de2c
SHA512502a332dd3c60e2beb6d8aae94229133fce480b1ed7d3526c8453e23b423c0062543f2042795c612b3ef7a2108c5b01d610bae4383fc64209dcd2cfe1082e4ed