General

  • Target

    ready.apk

  • Size

    8.5MB

  • Sample

    250120-sze6yawmhs

  • MD5

    f0ed630e746caf7d62f491cc862e9165

  • SHA1

    776bda4ed243694107d9277bec93e82af4822009

  • SHA256

    d3ca5e9686748e42bb496915ec943a7a3b0fe4cc550069a9a7f10d732d33190d

  • SHA512

    be28737e35c43a2b9a45ae191bdd9ab735751c4e387b25519114aaa142b0ea47dd2b3473f80a80ba4473ae3521fc44b071849016a89bcd559caf9e75531eeb2b

  • SSDEEP

    98304:6Lxb/PXrlJB7YCjmvOc4APsSsHmzRzBbT40thrF:Qp/fpJB7YCjmv07GzTjZF

Malware Config

Extracted

Family

spynote

C2

niewiemcodac.ddns.net:2137

Targets

    • Target

      ready.apk

    • Size

      8.5MB

    • MD5

      f0ed630e746caf7d62f491cc862e9165

    • SHA1

      776bda4ed243694107d9277bec93e82af4822009

    • SHA256

      d3ca5e9686748e42bb496915ec943a7a3b0fe4cc550069a9a7f10d732d33190d

    • SHA512

      be28737e35c43a2b9a45ae191bdd9ab735751c4e387b25519114aaa142b0ea47dd2b3473f80a80ba4473ae3521fc44b071849016a89bcd559caf9e75531eeb2b

    • SSDEEP

      98304:6Lxb/PXrlJB7YCjmvOc4APsSsHmzRzBbT40thrF:Qp/fpJB7YCjmv07GzTjZF

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Launchs application uninstaller.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks