General
-
Target
malware.apk
-
Size
6.2MB
-
Sample
250401-fj44xatwby
-
MD5
e5559a01c06fe5bfed0b767a44f6d1a0
-
SHA1
be5e5faf7ec29543043fa1d54df4d8ddc579b3e0
-
SHA256
f46e7f5e5b8a4d3be663d7177bce9577b219903c57f9a4e43c6bd01874d95091
-
SHA512
a39ef856130a7bb61d70e78d1659a65de8634f80a4eb0e6b6017258b4ec8fc35693c6122e538e3c85d2b5c67cfbfcd20a822ea315fbaf8d0b9ea434ff656aec6
-
SSDEEP
98304:NmfrbusKCjJwV5PaJNT7kZp6TMPmEwqvpJv4wdWzO03cY6Qi3X/cp84s2auqtpbN:vsKgwV5PRZp6Whw+AQn3Xkp84sMMT4Nk
Static task
static1
Behavioral task
behavioral1
Sample
malware.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
malware.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
spynote
62.146.233.100:3343
Targets
-
-
Target
malware.apk
-
Size
6.2MB
-
MD5
e5559a01c06fe5bfed0b767a44f6d1a0
-
SHA1
be5e5faf7ec29543043fa1d54df4d8ddc579b3e0
-
SHA256
f46e7f5e5b8a4d3be663d7177bce9577b219903c57f9a4e43c6bd01874d95091
-
SHA512
a39ef856130a7bb61d70e78d1659a65de8634f80a4eb0e6b6017258b4ec8fc35693c6122e538e3c85d2b5c67cfbfcd20a822ea315fbaf8d0b9ea434ff656aec6
-
SSDEEP
98304:NmfrbusKCjJwV5PaJNT7kZp6TMPmEwqvpJv4wdWzO03cY6Qi3X/cp84s2auqtpbN:vsKgwV5PRZp6Whw+AQn3Xkp84sMMT4Nk
-
Spynote family
-
Spynote payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1