MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e21f8722ab3d3557e7b0dda0faca39c517bbf0afd84bf4bbdc92687c9bd58aae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



SpyNote


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e21f8722ab3d3557e7b0dda0faca39c517bbf0afd84bf4bbdc92687c9bd58aae
SHA3-384 hash: ada3b0726b6c1972f822aa04234be54bd9148f7c4fb35a62637ec74624a23bf3b7f5c2ce4909d0055dd697d96760352d
SHA1 hash: 56789c19aad5966cfe5f8ae64ec65f6516eb3755
MD5 hash: 7b09dcf1f0a6b8d13c479a7f2105f9f0
humanhash: paris-undress-dakota-december
File name:Standoff2.apk
Download: download sample
Signature SpyNote
File size:778'701 bytes
First seen:2025-12-23 17:39:41 UTC
Last seen:Never
File type: apk
MIME type:application/java-archive
ssdeep 12288:ZPkOKa1a8LzeXx7etU70OU5WmpYshXZPbGwidNpg/:Z8ta1ameXgte0OU5WmD9idNpU
TLSH T14DF45B86FB4AF867C9F3C7368275C66A96464C544B43D7471A85723C0DBBAC08B89FC8
TrID 49.0% (.APK) Android Package (27000/1/5)
24.5% (.JAR) Java Archive (13500/1/2)
19.0% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
7.2% (.ZIP) ZIP compressed archive (4000/1)
Magika apk
Reporter BastianHein
Tags:apk signed Spynote

Code Signing Certificate

Organisation:Android
Issuer:Android
Algorithm:sha1WithRSAEncryption
Valid from:2008-02-29T01:33:46Z
Valid to:2035-07-17T01:33:46Z
Serial number: 936eacbe07f201df
Intelligence: 1716 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
63
Origin country :
CL CL
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
android base64 evasive fingerprint persistence signed
Result
Application Permissions
take pictures and videos (CAMERA)
read external storage contents (READ_EXTERNAL_STORAGE)
read Browser's history and bookmarks (READ_HISTORY_BOOKMARKS)
display system-level alerts (SYSTEM_ALERT_WINDOW)
read/modify/delete external storage contents (WRITE_EXTERNAL_STORAGE)
list accounts (GET_ACCOUNTS)
write contact data (WRITE_CONTACTS)
read contact data (READ_CONTACTS)
record audio (RECORD_AUDIO)
read SMS or MMS (READ_SMS)
read phone state and identity (READ_PHONE_STATE)
directly call phone numbers (CALL_PHONE)
coarse (network-based) location (ACCESS_COARSE_LOCATION)
fine (GPS) location (ACCESS_FINE_LOCATION)
receive SMS (RECEIVE_SMS)
retrieve running applications (GET_TASKS)
intercept outgoing calls (PROCESS_OUTGOING_CALLS)
modify global system settings (WRITE_SETTINGS)
control flashlight (FLASHLIGHT)
create Bluetooth connections (BLUETOOTH)
set wallpaper (SET_WALLPAPER)
set wallpaper size hints (SET_WALLPAPER_HINTS)
automatically start at boot (RECEIVE_BOOT_COMPLETED)
kill background processes (KILL_BACKGROUND_PROCESSES)
control vibrator (VIBRATE)
prevent phone from sleeping (WAKE_LOCK)
view network status (ACCESS_NETWORK_STATE)
view Wi-Fi status (ACCESS_WIFI_STATE)
change Wi-Fi status (CHANGE_WIFI_STATE)
full Internet access (INTERNET)
show app notification (READ_APP_BADGE)
Verdict:
Malicious
File Type:
apk
First seen:
2025-12-14T20:46:00Z UTC
Last seen:
2025-12-15T05:36:00Z UTC
Hits:
~10
Threat name:
Android.Trojan.Tripoli
Status:
Malicious
First seen:
2025-12-15 01:39:13 UTC
File Type:
Binary (Archive)
Extracted files:
431
AV detection:
21 of 36 (58.33%)
Threat level:
  5/5
Result
Malware family:
spynote
Score:
  10/10
Tags:
family:spynote android banker defense_evasion discovery impact persistence privilege_escalation
Behaviour
Registers a broadcast receiver at runtime (usually for listening for system events)
Makes use of the framework's foreground persistence service
Requests enabling of the accessibility settings.
Tries to add a device administrator.
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
Malware Config
C2 Extraction:
tcp.cloudpub.ru:48683
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments