Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
19-12-2024 13:30
Static task
static1
Behavioral task
behavioral1
Sample
playstoreupdate.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
playstoreupdate.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
playstoreupdate.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
playstoreupdate.apk
-
Size
6.0MB
-
MD5
0826938525ff0f4f400488819d1e7dc7
-
SHA1
f4f27d86869feba6d71857b9f6eb30e6763f2d89
-
SHA256
7742ce477fb7f78e181e114db46ace712e3a02d417f7ac8a20994f3f2db46c15
-
SHA512
2612805d2d6b1eb821d9735b2aa725f69da844a07e6764e6d9f487d7eabc7fc192237e9e9de2ef9400f68e5d8ad325a03e4b8abacb525d4ae449d3da3ed2c3bd
-
SSDEEP
98304:8cNby5wATPnRa6x5MY/PmzlzBQ0tNTPKduE1ujRzEY0HEIw:L+fRd8/zjNyXudzfr
Malware Config
Extracted
spynote
178.255.218.228:8005
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Spynote payload 1 IoCs
resource yara_rule behavioral2/memory/4966-0.dex family_spynote -
pid Process 4966 samoa.broken.hose -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/samoa.broken.hose/app_course/FmheFka.json 4966 samoa.broken.hose -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText samoa.broken.hose Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId samoa.broken.hose Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId samoa.broken.hose -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock samoa.broken.hose -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground samoa.broken.hose -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction samoa.broken.hose android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction samoa.broken.hose android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction samoa.broken.hose android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction samoa.broken.hose -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo samoa.broken.hose -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver samoa.broken.hose -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule samoa.broken.hose
Processes
-
samoa.broken.hose1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4966
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d67d71ce26173f839317fcb7aab7a549
SHA171ee11c41ea3f0768b47a70ec25fec53b5064b31
SHA2569178ecba48a68e3b5f4073225ab0986396d124560a97373099aec87974911037
SHA512a5243d345bd6c65507c7241fb125f1b63744d17916c43ffed44697899b3ed1bef77002eef8937ac1746016fa6bbcf09ca2404d341bd0a8dd7fe4b79850e45d23
-
Filesize
1.5MB
MD54bf457e5984f450f6ba58e8ab3b664aa
SHA1b1b83fc054b27665ea786c2ffd4031bf68c3ce2f
SHA2568fd0e02646c91b28dc2fe10bb9127f5c134ee0ce33952bb44547b207abedc6dd
SHA5128f3031d90a8fc7d22b275f75a6509f3233f2bdce9444621d6c679601c4a428e068bee4aabb807640a929c337916ddefa4c29bede345d8595d3b91bf20d2408a8
-
Filesize
3.3MB
MD5f9b565a9c3b6f390b2af177de72c423f
SHA1aa77b1b8cf5856e7f8be0ef51c8ce2cfdf2f9d9b
SHA256945661fe3aee21d95a031606d55ddbbb7f7afe916400f94fb982c2040ab57e6e
SHA5129c8684201f5498362bf7e7a5c39a5286560c8198a4bde40da57e9cde5023b7dc1935bce1b738030b16b6c7d9a79800edbbf56b3ce98f186a4459f5a04a2e6da5
-
Filesize
37B
MD50a4610dac6c5cf4ffbfc60b398c6c931
SHA1739319d03a3ad32d2b7a10deb1a950b68998b363
SHA2566e665f1d2d8d76372df135a1c6a1c185f503b45b861139b32468ce2b845947bc
SHA512a957072732d92d5864aff4bf8c07dda5f0cfc7202e12aaf932e08fc5f098e3b39e58bb41725b6f0f76d20ba8da1dcafc389e06187677223c68970c9ae64ba5c2
-
Filesize
37B
MD5600eb86e12c0229ebc382da1b9e3ab47
SHA16b19a94f5575e33aeb98b73c02e3ec2afa8be614
SHA256c20df23dbe426c91f69c95b99603bcd1aa118540842cb27e5a3e9ea221a09352
SHA512401f213d0b66ae8da9fc454df84c58840f6945b55461d47f178df9ae39669398ea8401f2fdd123452f8d55c85a8abf661ac4d512a0be46cb11bb43956dc75e02
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
288B
MD55ce7c87b3b844a0e445ff35b7f9a52f3
SHA1544c8792105db0d7bfee7ae1ed189581ea838a9c
SHA2563584911fead1d9f21019ba3222464f5472cbeaa50eca378a6f80b45830f44769
SHA512906c7775281706e502afa4adfbce8feb52e54919e8e32e96e2ccf31aaa07924bfa81ea6061469bb5fbf4e88362002fe022de54cd5174c668a654a507f48830dc