Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
13-02-2025 22:13
Static task
static1
Behavioral task
behavioral1
Sample
7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff.apk
-
Size
4.6MB
-
MD5
8879210e6ede5f517919b8f973c6302a
-
SHA1
799fe17872388e48bba4772b36528874ba440a8e
-
SHA256
7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff
-
SHA512
93e3c80ebb7a998e44a252bc9269d3b8ef75870232fe771558246b704cf63d3d49a8fe59d5e2d7da7d3aedfd630086cde7599ea6b717e246447fcd602e8847ae
-
SSDEEP
98304:jYJGUWWRMSivWvGBSqHFlU8eNzX6zPMVTmJE6oYZ6iB90vAJAvST4gOJJHGBt:j7SiMGBFbU8EXWWmJE69BGTqT4gHP
Malware Config
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Spynote payload 2 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_spynote behavioral1/memory/4311-1.dex family_spynote -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.farm.generates/files/arm/classes.dex 4311 com.farm.generates /data/user/0/com.farm.generates/files/arm/classes.dex 4337 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.farm.generates/files/arm/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.farm.generates/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.farm.generates/files/arm/classes.dex 4311 com.farm.generates -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.farm.generates -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.farm.generates -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.farm.generates -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.farm.generates -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.farm.generates
Processes
-
com.farm.generates1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4311 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.farm.generates/files/arm/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.farm.generates/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4337
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD55a3bb4c31aac3c2e8dd6f9d304f25506
SHA129ffa8937a7995186b6b208d7990524c6bc4a926
SHA2561e0c312459a4fbbbf7f61e456836be0e3465f04672b4d2c1c1d8a9fd964b330e
SHA512399915958aeb81fa3c6706ec670b8b6959ce29849823885ecdeb765e60f653c520e69458d9c8ab4435b6dd747e72397f1bf21c443b53d6c201b4af6aaf1e76f4
-
Filesize
5.1MB
MD5a193a734e1a54e31ecd4fc9f60147bb4
SHA1706f02964c892e3755cc070a65a8db20a22dff80
SHA256abae744ead54b7f5ec34c81477d26a83edb3d35935ea3ec46f2cc1d3c6cdb008
SHA512b5183a18b9696fa7c9ddf7715ca1481d475c332867b9539bee4e431cd196c53cecc04b3e9377d7e3c52a1f0fd6bd9506a3e9072b3315f0f5955d99064c60bf08
-
Filesize
25B
MD5bdb821a955117250611e94cd23842584
SHA181edcea1b44f94cfc140710c8410d0696b760c67
SHA256076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d
SHA512e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
25B
MD586fedabe3f0a126d12c251838c1b353e
SHA1fb8639c6e1c8eb8e0c5432349127a986b825bc6c
SHA25660060471c7fcb5acc85a6d6709eb6aadcfb670084b6aa7495ede54a585661370
SHA512f8cdd762c1bc820f38ea099da5fccd4eac1fac3512ef7a90b4195bb256991073d2fe01ae924459e31a648af2d0c60085f19c7602448dc932e1a2fdfc7f3dc844