General
-
Target
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.bin
-
Size
4.6MB
-
Sample
250209-1w8m3svmaw
-
MD5
fce76148e56cb8fe5c7e6909d9536e99
-
SHA1
00e19b74fb75abc79e7772a4adbcab5c342a58c3
-
SHA256
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9
-
SHA512
755322b5130af78d658a7005508b70ae0b63cae035e9752508924c7c1b65a366525df77b9d4ed31b6261f4790ea1238c519b42bb240cd1c05b303aafdd046a57
-
SSDEEP
98304:+U+WRcSSw8gUC9tN3rM9SpV+i8wjdwb8LvX5J7pHr0CbGBw:YSS9CDxrM9Spvdw4L/pHr0r+
Static task
static1
Behavioral task
behavioral1
Sample
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9.bin
-
Size
4.6MB
-
MD5
fce76148e56cb8fe5c7e6909d9536e99
-
SHA1
00e19b74fb75abc79e7772a4adbcab5c342a58c3
-
SHA256
87106c2406f1fc2920ba45adc65d275e9f9224f0572b54247a44eb5514f896b9
-
SHA512
755322b5130af78d658a7005508b70ae0b63cae035e9752508924c7c1b65a366525df77b9d4ed31b6261f4790ea1238c519b42bb240cd1c05b303aafdd046a57
-
SSDEEP
98304:+U+WRcSSw8gUC9tN3rM9SpV+i8wjdwb8LvX5J7pHr0CbGBw:YSS9CDxrM9Spvdw4L/pHr0r+
-
Spynote family
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1