Skip to content

Commit 49aba61

Browse files
authored
Add docs for SpyNote (#813)
1 parent 0ce4443 commit 49aba61

File tree

1 file changed

+115
-0
lines changed

1 file changed

+115
-0
lines changed

docs/source/quark_rules.rst

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -736,3 +736,118 @@ The table below lists the APKs we tested.
736736
+-------+------------------------------------------------------------------+
737737
| 22 | 969BCDB8DC4043483AB645AFFF4616A1845F2276EF4165475F6357D71508047C |
738738
+-------+------------------------------------------------------------------+
739+
740+
741+
New Quark Rules For SpyNote
742+
===========================
743+
744+
New Quark rules (#238 - #242) are now available. These rules target `SpyNote <https://www.f-secure.com/en/articles/take-a-note-of-spynote-malware>`_\ , a malware family that takes screenshots, simulates user gestures, logs user input, and communicates with C2 servers. Check `here <https://github.com/ev-flow/quark-rules>`_ for the rule details.
745+
746+
With these rules, Quark is now able to identify the SpyNote malware family as high-risk. In our experiment, Quark achieved 100% accuracy and 100% precision. Please check :ref:`here <list-of-tested-apks-spynote>` for the APKs we tested.
747+
748+
Below is a summary report of a SpyNote sample (\ ``0713a683567125ea6fdff233cfa850b36a0d2c7d7c964510405cbdf669fe2a8b``\ ). The report shows that Quark identified the sample as high-risk, with a list of behaviors as evidence.
749+
750+
751+
.. image:: https://i.postimg.cc/4NYt9kTb/Screenshot-2025-09-24-10-00-28-Screenshot-2025-09-24-10-03-382.jpg
752+
:target: https://i.postimg.cc/4NYt9kTb/Screenshot-2025-09-24-10-00-28-Screenshot-2025-09-24-10-03-382.jpg
753+
:alt:
754+
755+
756+
Identified Well-Known Threats
757+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
758+
759+
With Quark's `rule classification <https://quark-engine.readthedocs.io/en/latest/quark_reports.html#rule-classification>`_ feature, analysts can generate behavior maps and see how behaviors are related. This feature helps identify 4 well-known threats from SpyNote, as shown below.
760+
761+
**1. Take screenshots**
762+
763+
764+
.. image:: https://i.postimg.cc/wMcJFd87/screenshot.png
765+
:target: https://i.postimg.cc/wMcJFd87/screenshot.png
766+
:alt:
767+
768+
769+
The behavior map shows that the ``Lcom/maintain/gybbpabtniopoetzeacrkmlxdhuvgpvnwtahmsaxmtnaltfrgf2/keydkuycdcczonreivsieapzgrzkejxcowwsziydpvouihgqnu3/AccessService`` function obtains screenshot data and converts it into bitmap format.
770+
771+
Behaviors detected by Quark:
772+
773+
774+
* Extract screenshot data to bitmap format (#00238)
775+
776+
**2. Simulate user gestures**
777+
778+
779+
.. image:: https://i.postimg.cc/k4yXpMG3/gesture.png
780+
:target: https://i.postimg.cc/k4yXpMG3/gesture.png
781+
:alt:
782+
783+
784+
The behavior map shows that the ``Lcom/maintain/gybbpabtniopoetzeacrkmlxdhuvgpvnwtahmsaxmtnaltfrgf2/Perfct;clickByGesture`` function simulates user finger gestures on a mobile phone.
785+
786+
Behaviors detected by Quark:
787+
788+
789+
* Simulate user gestures (#00240)
790+
791+
**3. Log user input**
792+
793+
794+
.. image:: https://i.postimg.cc/pVcgt0r5/logging.png
795+
:target: https://i.postimg.cc/pVcgt0r5/logging.png
796+
:alt:
797+
798+
799+
The behavior map shows that the ``Lcom/maintain/gybbpabtniopoetzeacrkmlxdhuvgpvnwtahmsaxmtnaltfrgf2/keydkuycdcczonreivsieapzgrzkejxcowwsziydpvouihgqnu3/AccessService;checkPassword`` function obtains the description of a UI element. It also calls the ``Lcom/maintain/gybbpabtniopoetzeacrkmlxdhuvgpvnwtahmsaxmtnaltfrgf2/FileUtils;writeText`` to log the data to a file. If the UI element is a keypad button on the lock screen, the user's password can be logged.
800+
801+
Behaviors detected by Quark:
802+
803+
804+
* Get the description of a UI element (#00241)
805+
* Write data to a file (#00242)
806+
807+
**4. Communicate with C2 servers**
808+
809+
810+
.. image:: https://i.postimg.cc/cCHZkQPw/connect.png
811+
:target: https://i.postimg.cc/cCHZkQPw/connect.png
812+
:alt:
813+
814+
815+
The behavior map shows that the ``Lcom/maintain/gybbpabtniopoetzeacrkmlxdhuvgpvnwtahmsaxmtnaltfrgf2/hlshzietuthuztzpsjgswpikkmwdxkiqxbzdseqdoywzyerfhi4/CameraHandler$1;run`` function establishes a connection to an IP address, which could be a malicious C2 server.
816+
817+
Behaviors detected by Quark:
818+
819+
820+
* Establish a connection to an IP address (#00239)
821+
822+
.. _list-of-tested-apks-spynote:
823+
824+
List of Tested APKs
825+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
826+
827+
The table below lists the APKs we tested.
828+
829+
.. list-table::
830+
:header-rows: 1
831+
832+
* - index
833+
- sha256
834+
* - 1
835+
- 059b5f74e053c2966775157cd521580fcfaa3b1a7613560b8f499dbd9c11d4b4
836+
* - 2
837+
- 0713a683567125ea6fdff233cfa850b36a0d2c7d7c964510405cbdf669fe2a8b
838+
* - 3
839+
- 4b2b411e03aafaa19ea93286fadd39a5134f4a039db2d5019b1054547c0d5601
840+
* - 4
841+
- 5c01f7727c78dea9c89dccf92b01b4c45e69406e6462340779401497bf4d4589
842+
* - 5
843+
- 8c365bd58edeb2ca371ead5e28350ee6c480a79f558d967ecbef525e9f1d7b3e
844+
* - 6
845+
- da4f59bdc91eaeaba238a8ba9602f7d5cc75f0892a92f5422e23b55accbbb2f0
846+
* - 7
847+
- dd7650a9cd3f853e109d2d0138ede785e1559d6c2d8c52eec2f2d9808a924f1c
848+
* - 8
849+
- dee1eaaa8879a7d321ef4e698203be7b23eeda80a6dea3c70cbf3138597b1800
850+
* - 9
851+
- f46b863952599b91a4d2d682a80f345dfa03fad473d1938f2c53a3139c87a019
852+
* - 10
853+
- eec5096dfca6824317863f9225c29f6c4b3442c48fefa62dc382e3569bca5a60

0 commit comments

Comments
 (0)