General
-
Target
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5.bin
-
Size
4.0MB
-
Sample
250111-1x5mtatpej
-
MD5
2b663d5c389033d168a4c2e9ddc5c9c2
-
SHA1
25b9f76da86ffbfeb809da1b485070db154ce11b
-
SHA256
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5
-
SHA512
c1ee5d406ce098497ca8af8ea7343ed89f0df8ae0ad6c60db2f192ca31c33d736458f53f23a90739770d92ab7f6656a4f1c4f9b425585d15a974d527d8e98497
-
SSDEEP
98304:I/8QSkVBM3BokvfzVmz9zBwNwUTs0txRT5k:mrSkVBMxT0zA//Hdk
Static task
static1
Behavioral task
behavioral1
Sample
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5.bin
-
Size
4.0MB
-
MD5
2b663d5c389033d168a4c2e9ddc5c9c2
-
SHA1
25b9f76da86ffbfeb809da1b485070db154ce11b
-
SHA256
47db8b5f7980d7ba2c5b22a04f17bc3375dd088f6f4e131f6671753b65f1eba5
-
SHA512
c1ee5d406ce098497ca8af8ea7343ed89f0df8ae0ad6c60db2f192ca31c33d736458f53f23a90739770d92ab7f6656a4f1c4f9b425585d15a974d527d8e98497
-
SSDEEP
98304:I/8QSkVBM3BokvfzVmz9zBwNwUTs0txRT5k:mrSkVBMxT0zA//Hdk
-
Spynote family
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1