General

  • Target

    blablacar.apk

  • Size

    3.7MB

  • Sample

    250115-nxvrds1qgy

  • MD5

    16addca57f186937fabd839bf9e0d323

  • SHA1

    b4d102b28fd7d588c4e199a2993bda8dca4c4a28

  • SHA256

    f1eb7a3036e4cb88fcbdb2f7fb1e05b182a67929f627e564c5ab9b985c622326

  • SHA512

    f2a8e99f1a1776636115216e07c348a6c6e8e51e59145de669bc9cb2d9bfc31a6453c07d152f8ea156b03689dbc45f2eb9a793b518751afceb2b8c7a1defd372

  • SSDEEP

    49152:+yYqbAzdGGsQTOT0cgOmztQAUCvwZ7Sj5wdHl9EUkGz23VzZR21szek5ICCngR:vAzBLTC0tOmzzYO5UHgUkGKgUI2

Malware Config

Extracted

Family

spynote

C2

176.9.160.98:7771

Targets

    • Target

      blablacar.apk

    • Size

      3.7MB

    • MD5

      16addca57f186937fabd839bf9e0d323

    • SHA1

      b4d102b28fd7d588c4e199a2993bda8dca4c4a28

    • SHA256

      f1eb7a3036e4cb88fcbdb2f7fb1e05b182a67929f627e564c5ab9b985c622326

    • SHA512

      f2a8e99f1a1776636115216e07c348a6c6e8e51e59145de669bc9cb2d9bfc31a6453c07d152f8ea156b03689dbc45f2eb9a793b518751afceb2b8c7a1defd372

    • SSDEEP

      49152:+yYqbAzdGGsQTOT0cgOmztQAUCvwZ7Sj5wdHl9EUkGz23VzZR21szek5ICCngR:vAzBLTC0tOmzzYO5UHgUkGKgUI2

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks