General
-
Target
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
-
Size
6.6MB
-
Sample
241211-dzta8strgz
-
MD5
1d3bf0fb430b02719e7dd9d593c7c9fa
-
SHA1
68e0ea024fafb0c1c08557c7f6cfd84e418c5533
-
SHA256
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b
-
SHA512
828831d1511204122f4f73545595e5f325c52a94d6dc0d0ca31aa5cd091a3842bfce817a7ae0a2f8a97d376872094a784d5108c35eefa6dbdc835a519a3f7a17
-
SSDEEP
196608:sOk8v7XjvfAS9XzgHLE10b0mgMkmupz/oSmw:sOjjjvfAqXWLEiIkOgSt
Behavioral task
behavioral1
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
200.9.154.61:7554
Targets
-
-
Target
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
-
Size
6.6MB
-
MD5
1d3bf0fb430b02719e7dd9d593c7c9fa
-
SHA1
68e0ea024fafb0c1c08557c7f6cfd84e418c5533
-
SHA256
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b
-
SHA512
828831d1511204122f4f73545595e5f325c52a94d6dc0d0ca31aa5cd091a3842bfce817a7ae0a2f8a97d376872094a784d5108c35eefa6dbdc835a519a3f7a17
-
SSDEEP
196608:sOk8v7XjvfAS9XzgHLE10b0mgMkmupz/oSmw:sOjjjvfAqXWLEiIkOgSt
Score1/10 -
-
-
Target
childapp.apk
-
Size
3.9MB
-
MD5
4fc7f8f6b649f1aa03655d44f4675d10
-
SHA1
630689e1599bb4bd2807d35b5a529df96df2e7dc
-
SHA256
212194705ddd7c56b71d044cd0a3577af87e61c2aaa0421822088583dc949598
-
SHA512
3d6bfd78bad270a5297c8f4b3dd9120e1b898c7733e0eb998db23cb968d3866314a52fcadb5ae891695fde44574f1c8f14431271517835b94464b007b15e2341
-
SSDEEP
98304:XxE10b0mg463yklQuumzZzBHTX0tZRSmV00zV:BE10b0mgMkmupz/oSm1
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1