General

  • Target

    DarKnetJoKer.apk

  • Size

    8.5MB

  • Sample

    241116-xk8bdssakr

  • MD5

    1d4fbe75708e3b9f917771ee51c6b579

  • SHA1

    62f30155ab29bab3b838b9381ac9cd97e8a86d9b

  • SHA256

    1b092e036c2166e901393b46c088d10c3e7620bbc57fe86fa1fef04385fbf9b1

  • SHA512

    b068b9be44e13eae565e12afccffc85a6c369aea23767d213727e61997be96949225d506ccf07aecc99e3841877f2009ce27aa73d1f439c315a2c35ad294298e

  • SSDEEP

    49152:VBe2E8SKj+Ahu8NAgIaCpTro18nqWE+s8E2mz5zdGGIQTOjfUtYqi0cgFES4:j+8S0+AtAgRCpTs1Z8Bmz5zBPTU0tFC

Malware Config

Extracted

Family

spynote

C2

previous-casual.gl.at.ply.gg:7771

Targets

    • Target

      DarKnetJoKer.apk

    • Size

      8.5MB

    • MD5

      1d4fbe75708e3b9f917771ee51c6b579

    • SHA1

      62f30155ab29bab3b838b9381ac9cd97e8a86d9b

    • SHA256

      1b092e036c2166e901393b46c088d10c3e7620bbc57fe86fa1fef04385fbf9b1

    • SHA512

      b068b9be44e13eae565e12afccffc85a6c369aea23767d213727e61997be96949225d506ccf07aecc99e3841877f2009ce27aa73d1f439c315a2c35ad294298e

    • SSDEEP

      49152:VBe2E8SKj+Ahu8NAgIaCpTro18nqWE+s8E2mz5zdGGIQTOjfUtYqi0cgFES4:j+8S0+AtAgRCpTs1Z8Bmz5zBPTU0tFC

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks