General
-
Target
ready.apk
-
Size
38.9MB
-
Sample
241128-cf9nfawpdr
-
MD5
82b614de8c5623c9e46194f1d155016e
-
SHA1
3d22abb31a546f14e9171d0b0ac9f291ca627ec7
-
SHA256
dbf32f8c2f93963373dabcc455029d1dbf1388019e50a681a4a4d75c9fe6072a
-
SHA512
4b783d8ef4d0b9574b8aa34fcd2b490263d6d01e9fc126668c52b57ba89fb8c2f562baa70ba18e701d2c1c57e1a10de10c9d8d50d05205b2fe50c66a689e46b8
-
SSDEEP
49152:AhL0S2yoyxw1l436LZ2wZlybbZXfv/6ImzpzdGGjQTOCMUkYqb0cgxsGwikC/:Qlxw1l436g/ZPvCImzpzBkTs0txsa/
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ready.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ready.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
192.168.1.214:7771
Targets
-
-
Target
ready.apk
-
Size
38.9MB
-
MD5
82b614de8c5623c9e46194f1d155016e
-
SHA1
3d22abb31a546f14e9171d0b0ac9f291ca627ec7
-
SHA256
dbf32f8c2f93963373dabcc455029d1dbf1388019e50a681a4a4d75c9fe6072a
-
SHA512
4b783d8ef4d0b9574b8aa34fcd2b490263d6d01e9fc126668c52b57ba89fb8c2f562baa70ba18e701d2c1c57e1a10de10c9d8d50d05205b2fe50c66a689e46b8
-
SSDEEP
49152:AhL0S2yoyxw1l436LZ2wZlybbZXfv/6ImzpzdGGjQTOCMUkYqb0cgxsGwikC/:Qlxw1l436g/ZPvCImzpzBkTs0txsa/
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1