General
-
Target
client.apk
-
Size
760KB
-
Sample
250330-m2mqxaxtbw
-
MD5
17341301ef64dae887ecaaeb1788cdbc
-
SHA1
978988d7eacafb8b9e8e17e87c79ce6dede3ce26
-
SHA256
03576bb5ad968e86c97e69964bbadce22b92ed744303de178b0ddd3a9aba116d
-
SHA512
4fdff973c76c1eb8c99d77ecca5ae39a90d262efc4c1cc03db64ea9371ab704d0f6ece473f04738b80eca26a72552703237c9cb2b836c1f847aac97ee979c438
-
SSDEEP
12288:yiAYHza1a8LrePYCrYtpOk5WmpYshXZPbGwidNpgDC3wK:rza1a2ePYBtpOk5WmD9idNpHj
Behavioral task
behavioral1
Sample
client.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
client.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
client.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
spynote
ngrok-free.app:8080
Targets
-
-
Target
client.apk
-
Size
760KB
-
MD5
17341301ef64dae887ecaaeb1788cdbc
-
SHA1
978988d7eacafb8b9e8e17e87c79ce6dede3ce26
-
SHA256
03576bb5ad968e86c97e69964bbadce22b92ed744303de178b0ddd3a9aba116d
-
SHA512
4fdff973c76c1eb8c99d77ecca5ae39a90d262efc4c1cc03db64ea9371ab704d0f6ece473f04738b80eca26a72552703237c9cb2b836c1f847aac97ee979c438
-
SSDEEP
12288:yiAYHza1a8LrePYCrYtpOk5WmpYshXZPbGwidNpgDC3wK:rza1a2ePYBtpOk5WmD9idNpHj
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Tries to add a device administrator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Privilege Escalation
Abuse Elevation Control Mechanism
1Device Administrator Permissions
1