General

  • Target

    7742ce477fb7f78e181e114db46ace712e3a02d417f7ac8a20994f3f2db46c15.apk

  • Size

    6.0MB

  • Sample

    241220-e14zsszqfq

  • MD5

    0826938525ff0f4f400488819d1e7dc7

  • SHA1

    f4f27d86869feba6d71857b9f6eb30e6763f2d89

  • SHA256

    7742ce477fb7f78e181e114db46ace712e3a02d417f7ac8a20994f3f2db46c15

  • SHA512

    2612805d2d6b1eb821d9735b2aa725f69da844a07e6764e6d9f487d7eabc7fc192237e9e9de2ef9400f68e5d8ad325a03e4b8abacb525d4ae449d3da3ed2c3bd

  • SSDEEP

    98304:8cNby5wATPnRa6x5MY/PmzlzBQ0tNTPKduE1ujRzEY0HEIw:L+fRd8/zjNyXudzfr

Malware Config

Extracted

Family

spynote

C2

178.255.218.228:8005

Targets

    • Target

      7742ce477fb7f78e181e114db46ace712e3a02d417f7ac8a20994f3f2db46c15.apk

    • Size

      6.0MB

    • MD5

      0826938525ff0f4f400488819d1e7dc7

    • SHA1

      f4f27d86869feba6d71857b9f6eb30e6763f2d89

    • SHA256

      7742ce477fb7f78e181e114db46ace712e3a02d417f7ac8a20994f3f2db46c15

    • SHA512

      2612805d2d6b1eb821d9735b2aa725f69da844a07e6764e6d9f487d7eabc7fc192237e9e9de2ef9400f68e5d8ad325a03e4b8abacb525d4ae449d3da3ed2c3bd

    • SSDEEP

      98304:8cNby5wATPnRa6x5MY/PmzlzBQ0tNTPKduE1ujRzEY0HEIw:L+fRd8/zjNyXudzfr

    • Spynote

      Spynote is a Remote Access Trojan first seen in 2017.

    • Spynote family

    • Spynote payload

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks