General
-
Target
1d3bf0fb430b02719e7dd9d593c7c9fa.bin
-
Size
5.2MB
-
Sample
241212-bgkv2azjcl
-
MD5
b86a9b22fff564bcbad7b0743be14c0a
-
SHA1
245534ad1472f269a3029a3ee10578c8345606ff
-
SHA256
f99241c9ec325f1ba033e509ed408a61f3eb44a8cbf477beba67011657a82ac6
-
SHA512
a58bc5b4a7a6285c4daab059a7f84438fcc810a35d5e7b863fcd0ee29f7b65ea00c801d92c3e15ca23ae685f17dd812bf7620b4428d933cbe9bf07e9c4c0a4f0
-
SSDEEP
98304:yy5ZCdLIm4HlkSirgLwsJZmr0m/yM+G7wG8XBE+OWysnU8um6QUutQo:3S+6SiMdmr0m/yMfMG8XBEvWyqU8oQUc
Behavioral task
behavioral1
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
200.9.154.61:7554
Targets
-
-
Target
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b.apk
-
Size
6.6MB
-
MD5
1d3bf0fb430b02719e7dd9d593c7c9fa
-
SHA1
68e0ea024fafb0c1c08557c7f6cfd84e418c5533
-
SHA256
c684dd975ab9900f3ac0e7a5f0a0853f28a700513fa96f69d42a3276a47f061b
-
SHA512
828831d1511204122f4f73545595e5f325c52a94d6dc0d0ca31aa5cd091a3842bfce817a7ae0a2f8a97d376872094a784d5108c35eefa6dbdc835a519a3f7a17
-
SSDEEP
196608:sOk8v7XjvfAS9XzgHLE10b0mgMkmupz/oSmw:sOjjjvfAqXWLEiIkOgSt
Score1/10 -
-
-
Target
childapp.apk
-
Size
3.9MB
-
MD5
4fc7f8f6b649f1aa03655d44f4675d10
-
SHA1
630689e1599bb4bd2807d35b5a529df96df2e7dc
-
SHA256
212194705ddd7c56b71d044cd0a3577af87e61c2aaa0421822088583dc949598
-
SHA512
3d6bfd78bad270a5297c8f4b3dd9120e1b898c7733e0eb998db23cb968d3866314a52fcadb5ae891695fde44574f1c8f14431271517835b94464b007b15e2341
-
SSDEEP
98304:XxE10b0mg463yklQuumzZzBHTX0tZRSmV00zV:BE10b0mgMkmupz/oSm1
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1