General

  • Target

    client.apk

  • Size

    873KB

  • Sample

    240630-rawlyssdkn

  • MD5

    c8aef2a9ad8668f2d7d58321e8722dbd

  • SHA1

    2bf9a50225e31cf5bacf861758fcadf18b19ca47

  • SHA256

    96bcdbd48d148de60c7227e5b2fd65f04badffd238af3ccfb7c9080e44e1b412

  • SHA512

    c297cd0d40e59ca1d6d0b69a4d45ae505fb6b0948c4f4265dfd638e84610bbce93aa43f2bc4381b19042196f95cf517311c9d95750d6ee21accaf29b03d2017a

  • SSDEEP

    24576:SvsGTa1a6eFxV5Ca9hmEerpvBv5WmD9idNpz:Ua1ad9TTmJWk0d/z

Malware Config

Extracted

Family

spynote

C2

java-mas.gl.at.ply.gg:23199

Targets

    • Target

      client.apk

    • Size

      873KB

    • MD5

      c8aef2a9ad8668f2d7d58321e8722dbd

    • SHA1

      2bf9a50225e31cf5bacf861758fcadf18b19ca47

    • SHA256

      96bcdbd48d148de60c7227e5b2fd65f04badffd238af3ccfb7c9080e44e1b412

    • SHA512

      c297cd0d40e59ca1d6d0b69a4d45ae505fb6b0948c4f4265dfd638e84610bbce93aa43f2bc4381b19042196f95cf517311c9d95750d6ee21accaf29b03d2017a

    • SSDEEP

      24576:SvsGTa1a6eFxV5Ca9hmEerpvBv5WmD9idNpz:Ua1ad9TTmJWk0d/z

    • Removes its main activity from the application launcher

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks