General
-
Target
playstoreupdate.apk
-
Size
7.6MB
-
Sample
241130-cc7pnswqdt
-
MD5
e37e339a996f8ab441f89b1a4c37fd68
-
SHA1
a8ecd2a57b9eed130d7c5ea21c825bd1e1b5dc55
-
SHA256
ed98c0f937f561ae1dcc213b7e9d6c788a5f6b90dc26980a44dd3d81b100c66a
-
SHA512
077606b01b811bc40c34972245a917284efed7f0590dea63860881e74d2821ae95a26faf846a6e5e82f7fa51726acadb6106ef57b4ac0b6c8bff0fa60a8d1b40
-
SSDEEP
98304:nt0tyzBaJ8Ueh6G07e3eQK5Y0c70WO8suXye39zO44z1ToBeaMW1fGEluqWObrGR:ivFVUyGfrWErGXXVslkxT9izgt4q
Static task
static1
Behavioral task
behavioral1
Sample
playstoreupdate.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
playstoreupdate.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
playstoreupdate.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
178.255.218.228:7009
Targets
-
-
Target
playstoreupdate.apk
-
Size
7.6MB
-
MD5
e37e339a996f8ab441f89b1a4c37fd68
-
SHA1
a8ecd2a57b9eed130d7c5ea21c825bd1e1b5dc55
-
SHA256
ed98c0f937f561ae1dcc213b7e9d6c788a5f6b90dc26980a44dd3d81b100c66a
-
SHA512
077606b01b811bc40c34972245a917284efed7f0590dea63860881e74d2821ae95a26faf846a6e5e82f7fa51726acadb6106ef57b4ac0b6c8bff0fa60a8d1b40
-
SSDEEP
98304:nt0tyzBaJ8Ueh6G07e3eQK5Y0c70WO8suXye39zO44z1ToBeaMW1fGEluqWObrGR:ivFVUyGfrWErGXXVslkxT9izgt4q
-
Spynote family
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1