Analysis
-
max time kernel
7s -
max time network
151s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
14-02-2025 04:02
Static task
static1
Behavioral task
behavioral1
Sample
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca.apk
Resource
android-x86-arm-20240624-en
General
-
Target
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca.apk
-
Size
60.0MB
-
MD5
b0081c7a5101d0a2b6d9ad4df983bb29
-
SHA1
c2afd70af6cf2f2c185b1a0a5efe9fda6420f21b
-
SHA256
c2a7d0ae4f95a2e2de81357948afad740f76c7a2fb7f77917316dd5d5f17d9ca
-
SHA512
fd1b9513c22cee8d5413e520ffc597b230d61c705667f0f649083cc690b479ecbd440f6756f65e794788809d65c0052b7f91308ee44b0a405618307f338b3eea
-
SSDEEP
1572864:V8OBXNBCV8S11b3UZ/LK117L3GEXUoVlkaVhEv1hWEYqotjXw:V8cBCuS11bElKb7rHUmSaHE9hdl
Malware Config
Extracted
spynote
147.189.171.248:7771
Signatures
-
Spynote
Spynote is a Remote Access Trojan first seen in 2017.
-
Spynote family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/holiday.scales.soldiers/app_ded/LbvuFmHBT40b1ARkknK05csfSr5XmNYs.dex 4413 holiday.scales.soldiers -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal holiday.scales.soldiers
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD57abead672d37dd8336207c353fcd0a56
SHA105a8a30b801c2eadd80c88c3c022535bfc43d8a9
SHA256b7015faa700c445d954b354481eb6de2e15979fe50ba0a15d5afeed75478311e
SHA51203b7882d6b952d64148f6c3c6b2529598d19aca0d305bfba70a2f81935e5f91fd217b2b75de850e618823c275a2c6a5524e2adfac371ea186ef6fa2f55a21e89