General
-
Target
ready.apk
-
Size
3.6MB
-
Sample
241121-grwm6stndn
-
MD5
4808782d6d09ecb08dbd1dee07c652ff
-
SHA1
2d5c7e98593e02996c5db00444ac678bb9463289
-
SHA256
240640989e284dc9ebfed246b9db717654a1798b1fe1da775b57f10dd13157bb
-
SHA512
4e8ea03bdcfff3deb571eb266bd103f4d7123631991c5f2cb64cb9dc0d1ce9828f75c3559a27ba9fd2a937cf6ddabee34996e8341d33dd5233d34c43154037e8
-
SSDEEP
98304:Y+/42pk+ftZFLZ99Ow7d2iHkbknSmzHzBfTN0thJ:rk+1ZFLZ7Oedi6zBC3
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Extracted
spynote
afiffebri123-60395.portmap.io:60395
Targets
-
-
Target
ready.apk
-
Size
3.6MB
-
MD5
4808782d6d09ecb08dbd1dee07c652ff
-
SHA1
2d5c7e98593e02996c5db00444ac678bb9463289
-
SHA256
240640989e284dc9ebfed246b9db717654a1798b1fe1da775b57f10dd13157bb
-
SHA512
4e8ea03bdcfff3deb571eb266bd103f4d7123631991c5f2cb64cb9dc0d1ce9828f75c3559a27ba9fd2a937cf6ddabee34996e8341d33dd5233d34c43154037e8
-
SSDEEP
98304:Y+/42pk+ftZFLZ99Ow7d2iHkbknSmzHzBfTN0thJ:rk+1ZFLZ7Oedi6zBC3
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Subvert Trust Controls
1Code Signing Policy Modification
1