General
-
Target
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.bin
-
Size
4.5MB
-
Sample
250212-1ykc9sypam
-
MD5
429b0b247f3df5d5964a86a0b91bf3dd
-
SHA1
3f47af171af0cbc4c9b06bacd31b06c098eaf4bd
-
SHA256
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4
-
SHA512
ae41597e729558af6d7d93d32a754c576448243c3d6106c33457e310272f19fc9dfadf1b561e214d416de039f6f083dc00ec61e6bbc9285944bee1ae3c08a350
-
SSDEEP
98304:9Ub3SihZoo+ruOqVuq/qIEdrbfJ7rDWRXGBQlcc:w3Si74uZFqIEDr7yac
Static task
static1
Behavioral task
behavioral1
Sample
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4.bin
-
Size
4.5MB
-
MD5
429b0b247f3df5d5964a86a0b91bf3dd
-
SHA1
3f47af171af0cbc4c9b06bacd31b06c098eaf4bd
-
SHA256
5fd377d9b1e4ab33de695fc80b956f5f00b94b7347c6259ba0a1983fb308cfe4
-
SHA512
ae41597e729558af6d7d93d32a754c576448243c3d6106c33457e310272f19fc9dfadf1b561e214d416de039f6f083dc00ec61e6bbc9285944bee1ae3c08a350
-
SSDEEP
98304:9Ub3SihZoo+ruOqVuq/qIEdrbfJ7rDWRXGBQlcc:w3Si74uZFqIEDr7yac
-
Spynote family
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1