General
-
Target
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca.apk
-
Size
60.0MB
-
Sample
250214-elre6askfz
-
MD5
b0081c7a5101d0a2b6d9ad4df983bb29
-
SHA1
c2afd70af6cf2f2c185b1a0a5efe9fda6420f21b
-
SHA256
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca
-
SHA512
fd1b9513c22cee8d5413e520ffc597b230d61c705667f0f649083cc690b479ecbd440f6756f65e794788809d65c0052b7f91308ee44b0a405618307f338b3eea
-
SSDEEP
1572864:V8OBXNBCV8S11b3UZ/LK117L3GEXUoVlkaVhEv1hWEYqotjXw:V8cBCuS11bElKb7rHUmSaHE9hdl
Static task
static1
Behavioral task
behavioral1
Sample
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
spynote
147.189.171.248:7771
Targets
-
-
Target
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca.apk
-
Size
60.0MB
-
MD5
b0081c7a5101d0a2b6d9ad4df983bb29
-
SHA1
c2afd70af6cf2f2c185b1a0a5efe9fda6420f21b
-
SHA256
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca
-
SHA512
fd1b9513c22cee8d5413e520ffc597b230d61c705667f0f649083cc690b479ecbd440f6756f65e794788809d65c0052b7f91308ee44b0a405618307f338b3eea
-
SSDEEP
1572864:V8OBXNBCV8S11b3UZ/LK117L3GEXUoVlkaVhEv1hWEYqotjXw:V8cBCuS11bElKb7rHUmSaHE9hdl
-
Spynote family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1