Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
23-11-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
голые фото.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
голые фото.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
голые фото.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
голые фото.apk
-
Size
4.2MB
-
MD5
d3c9ff78acd0d1852fa2431aa735b4bb
-
SHA1
1630b2dbbdc42c6c9bdf18ab8a062c946cd4b762
-
SHA256
d9092bf5bfa631044fd1392fdf988ac5e5dffa2384202d6e7f6e6760fc5dde0b
-
SHA512
419a529305403ea80fafa344db6b48dc02423dcf2c08d1d8b62e699f69e7dc635c8b8770ca4af1277db39e81bc40e0b4cf00aa22b53b4fc9a0d58cb45658e8ca
-
SSDEEP
98304:yKukrQKBHMmuLd2QLuBnGOSyMwBqIGRoorkGT:tQKBHMmuLd2QegRoorh
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Spynote payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_spynote -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/cet.syndrome.springfield/app_mph_dex/apk.crazy-v1.AndroidManifest.xml 5052 cet.syndrome.springfield /data/user/0/cet.syndrome.springfield/app_mph_dex/apk.crazy-v1.AndroidManifest.xml 5052 cet.syndrome.springfield -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId cet.syndrome.springfield -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock cet.syndrome.springfield -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 76 8.tcp.eu.ngrok.io 135 8.tcp.eu.ngrok.io 140 8.tcp.eu.ngrok.io 9 8.tcp.eu.ngrok.io -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cet.syndrome.springfield -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cet.syndrome.springfield -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule cet.syndrome.springfield
Processes
-
cet.syndrome.springfield1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5052
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD523e84a23dbe7b2cef8604967af63544e
SHA106d9fd8f5e00541bee5ebb54f7c077cb85bd5ce3
SHA256c717af7452d721a9aae9c524123d0dd6b3f868b6cc728b1e8dfeea0e16f67393
SHA5128e1edaa52757a978fad0b70a5f557b3d960dcd2cfbc054e6706a275350aefd1159c9d5845fb12c87f5d5a7697d4c0a84379cad6513a5be80e314a69c7f37d490
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
25B
MD5c4560a0fc75a01c6753aaa6eb4ec82e1
SHA19dc57a66194e2d84e8c22674a74bd51d1dbfb311
SHA256cfbf37e8ec5deacb335e33b55db61b2a1bcc8db370e8cac051e0fe1ac79dd969
SHA512862d0d88a419ddd6fc9c0fb5bcd587086b343231e106c44166e2fe69fb4e5196a0eca5a79e5f55f61f174ae329bb327cd533bd1258dd9e31534415cd77267e90
-
Filesize
25B
MD5bdb821a955117250611e94cd23842584
SHA181edcea1b44f94cfc140710c8410d0696b760c67
SHA256076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d
SHA512e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268