Deceptive websites cloned from the Google Play Store are delivering AndroidOS SpyNote RAT via APK droppers that use dynamic payload decryption, DEX element injection, and added anti-analysis techniques to evade detection. The actor re-used infrastructure with minor IP rotations and continues to target consumers with spoofed popular apps like Chrome, CamSoda, and iHappy. #SpyNote #Chrome #CamSoda
Keypoints
- Actors deploy fake Google Play Store web pages to trick users into downloading malicious .apk files directly via JavaScript-triggered downloads.
- Initial droppers decrypt and join encrypted assets (files â000â and â001â) using an AES key derived from the manifest to produce the SpyNote APK.
- Dropper employs DEX element injection and reflection to insert malicious code into the ClassLoader, forcing execution of malicious code over legitimate app code.
- SpyNote capabilities include camera/microphone control, keylogging, accessibility abuse to steal 2FA codes, overlay attacks, and remote device control including wipe/lock.
- Recent samples use control flow and identifier obfuscation (variations of o, O, 0) in C2 logic and added anti-analysis measures in the APK dropper.
- Infrastructure is relatively static and confined to a few IPs/domains (e.g., 154.90.58[.]26 and 199.247.6[.]61) though IP resolutions are occasionally rotated.
- Actor targets a broad consumer audience with lures mimicking social, gaming, and utility apps (examples: Chrome, CamSoda, iHappy) suggesting financially motivated operations.
MITRE Techniques
- [T1636.004 ] Collect SMS Messages â SpyNote can steal SMS messages as part of its data exfiltration capabilities (âStealing SMS messagesâ).
- [T1636.003 ] Contact List â SpyNote accesses and exfiltrates the device contact list (âAccessing and exfiltrating contact listâ).
- [T1636.002 ] Call Log â SpyNote reads call logs to gather caller information and history (âReading call logsâ).
- [T1430 ] Location Tracking â SpyNote tracks GPS location to monitor victim movements (âTracking GPS locationâ).
- [T1533 ] Data from Local System â SpyNote accesses files and photos from local storage (âAccessing and potentially stealing files from external storageâ, âStealing photosâ).
- [T1640 ] Device Information Discovery â SpyNote extracts device identifiers and system specs (IMEI, etc.) (âExtracting device information (IMEI, system specs)â).
- [T1657 ] Network Traffic Monitoring â SpyNote can monitor network traffic on the device (âMonitoring network trafficâ).
- [T1428 ] Camera Capture â SpyNote can activate the device camera to capture photos or video (âActivating the deviceâs camera to capture photos or videosâ).
- [T1429 ] Audio Capture â SpyNote records audio from the device microphone (âRecording audio from the deviceâs microphoneâ).
- [T1646 ] Make Phone Call â SpyNote can initiate phone calls from the device (âMaking phone callsâ).
- [T1645 ] Call Recording â SpyNote can intercept and record incoming phone calls (âIntercepting incoming phone calls and recording themâ).
- [T1132 ] External Remote Services â SpyNote provides remote command execution via a shell or similar remote services (âProviding a shell terminal for remote command executionâ).
- [T1478 ] Input Capture â SpyNote implements keylogging to capture keystrokes (âKeylogging (recording keystrokes)â).
- [T1555.004 ] Credentials in Files â SpyNote targets application credentials and can extract 2FA codes and other credentials (âTargeting credentials for various applications (banking, social media)â, âExtracting two-factor authentication (2FA) codesâ).
- [T1641 ] Overlay Windows â SpyNote displays overlays for clickjacking and credential theft (âDisplaying content over other applications (clickjacking)â).
- [T1485 ] Data Destruction â SpyNote can remotely wipe device data if granted privileges (âRemotely wiping dataâ).
- [T1486 ] Device Lockout â SpyNote can remotely lock the device (âRemotely locking the deviceâ).
- [T1535 ] Reset Device Password â SpyNote can reset device passwords remotely (âRemotely resetting the device passwordâ).
- [T1534 ] Install Other Software â SpyNote can download and install additional apps without user consent (âDownloading and installing new applications without user consentâ).
- [T1539 ] Update Software â SpyNote supports self-updating capabilities (âSelf-updatingâ).
- [T1574 ] File Deletion â SpyNote can delete collected data from storage (âDeleting collected data from the SD cardâ).
- [T1518 ] Installed Application List â SpyNote detects other installed apps to tailor targeting (âDetecting other installed applicationsâ).
- [T1656 ] Screen Capture â SpyNote can capture screen content (âCapturing screen contentâ).
- [T1556 ] Webview Injection â SpyNote can inject links into webviews within apps (âInjecting web links into web view modules within applicationsâ).
- [T1668 ] Hide Icons â SpyNote hides its app icon to avoid discovery (âHiding its application icon from the app launcherâ).
- [T1624.001 ] Event Triggered Execution: Broadcast Receivers â SpyNote automatically restarts services after reboot (âAutomatically starting malicious services after device rebootâ).
- [T1520 ] Persistence via System Application â SpyNote implements resilient âdiehard servicesâ to resist termination (âImplementing âdiehard servicesâ that are difficult to shut downâ).
- [T1546.003 ] Disable or Modify System Configuration: Disable Battery Optimization â SpyNote excludes itself from battery optimization to stay active (âExcluding itself from battery optimization settingsâ).
- [T1529 ] Abuse of OS Features: Notifications â SpyNote uses silent persistent notifications to maintain presence (âDisplaying continuous silent notifications to maintain a persistent presenceâ).
- [T1547 ] Prevent Application Uninstall â SpyNote monitors for uninstall attempts and blocks removal (âMonitoring system settings for attempts to remove the application and blocking themâ).
- [T1550 ] Abuse of Accessibility Features â SpyNote hijacks Accessibility Services to simulate inputs and steal 2FA codes (âHijacking accessibility services to simulate user inputs to prevent uninstallationâ).
- [T1701 ] Application Manipulation â SpyNote automatically navigates or manipulates UI to interfere with user attempts to remove it (âAutomatically navigating back to the deviceâs home screen when a user tries to access app settingsâ).
Indicators of Compromise
- [IP Address ] delivery and C2 infrastructure â 154.90.58[.]26 (delivery hosting many malicious APKs), 199.247.6[.]61 (C2 hosting domains)
- [Domain ] malicious delivery and C2 domains â bcgrt[.]top (example delivery URL https://bcgrt[.]top/Beauty.apk), mskisdakw[.]top (C2 example); many other .top domains used for APK hosting.
- [File Name ] spoofed APK filenames used as lures â Chrome.apk, CamSoda.apk, iHappy.apk (examples from delivery URLs)
- [File Hash ] dropper and payload hashes â Chrome.apk (dropper) SHA-256: 48aa5f908fa6âŚ66e8, Classes.dex (SpyNote) SHA-256: 86e8d3716318âŚb9e8 (and additional combined decrypted SpyNote asset hash b81febd19a45âŚd0d6)
- [JavaScript/HTML Artifacts ] page and iframe indicators â embedded strings and resources like âsBw2N8uateIzRr93vmFze5MF_35vMk5F1wG04L5JcJEâ and âPJKdyVFC5jlu_l8Wo_hirJkhs1cmitmn44fgpOc3zFcâ found in fake Play Store pages.
Read more: https://dti.domaintools.com/spynote-malware-part-2/