Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    13-02-2025 22:13

General

  • Target

    7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff.apk

  • Size

    4.6MB

  • MD5

    8879210e6ede5f517919b8f973c6302a

  • SHA1

    799fe17872388e48bba4772b36528874ba440a8e

  • SHA256

    7bf6147f6c654823be667e24c16f3e6b823d0d74e779dad0998ee27a8f3a72ff

  • SHA512

    93e3c80ebb7a998e44a252bc9269d3b8ef75870232fe771558246b704cf63d3d49a8fe59d5e2d7da7d3aedfd630086cde7599ea6b717e246447fcd602e8847ae

  • SSDEEP

    98304:jYJGUWWRMSivWvGBSqHFlU8eNzX6zPMVTmJE6oYZ6iB90vAJAvST4gOJJHGBt:j7SiMGBFbU8EXWWmJE69BGTqT4gHP

Malware Config

Signatures

  • Spynote

    Spynote is a Remote Access Trojan first seen in 2017.

  • Spynote family
  • Spynote payload 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.farm.generates
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:4311
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.farm.generates/files/arm/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.farm.generates/files/arm/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4337

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.farm.generates/files/arm/classes.dex

    Filesize

    5.1MB

    MD5

    5a3bb4c31aac3c2e8dd6f9d304f25506

    SHA1

    29ffa8937a7995186b6b208d7990524c6bc4a926

    SHA256

    1e0c312459a4fbbbf7f61e456836be0e3465f04672b4d2c1c1d8a9fd964b330e

    SHA512

    399915958aeb81fa3c6706ec670b8b6959ce29849823885ecdeb765e60f653c520e69458d9c8ab4435b6dd747e72397f1bf21c443b53d6c201b4af6aaf1e76f4

  • /data/user/0/com.farm.generates/files/arm/classes.dex

    Filesize

    5.1MB

    MD5

    a193a734e1a54e31ecd4fc9f60147bb4

    SHA1

    706f02964c892e3755cc070a65a8db20a22dff80

    SHA256

    abae744ead54b7f5ec34c81477d26a83edb3d35935ea3ec46f2cc1d3c6cdb008

    SHA512

    b5183a18b9696fa7c9ddf7715ca1481d475c332867b9539bee4e431cd196c53cecc04b3e9377d7e3c52a1f0fd6bd9506a3e9072b3315f0f5955d99064c60bf08

  • /storage/emulated/0/Config/sys/apps/log/log-2025-02-13.txt

    Filesize

    25B

    MD5

    bdb821a955117250611e94cd23842584

    SHA1

    81edcea1b44f94cfc140710c8410d0696b760c67

    SHA256

    076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d

    SHA512

    e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268

  • /storage/emulated/0/Config/sys/apps/log/log-2025-02-13.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2025-02-13.txt

    Filesize

    25B

    MD5

    86fedabe3f0a126d12c251838c1b353e

    SHA1

    fb8639c6e1c8eb8e0c5432349127a986b825bc6c

    SHA256

    60060471c7fcb5acc85a6d6709eb6aadcfb670084b6aa7495ede54a585661370

    SHA512

    f8cdd762c1bc820f38ea099da5fccd4eac1fac3512ef7a90b4195bb256991073d2fe01ae924459e31a648af2d0c60085f19c7602448dc932e1a2fdfc7f3dc844