SpyC23 is a mobile malware that has been used by APT-C-23 since at least 2017. SpyC23 has been observed primarily targeting Android devices in the Middle East.[1]
There are multiple close variants of SpyC23, such as VAMP[2], GnatSpy[3], Desert Scorpion and FrozenCell, which add some additional functionality but are not significantly different from the original malware.
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1517 | Access Notifications |
SpyC23 reads notifications from applications and connected wearables.[1][4][5][6] |
|
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
SpyC23 can communicate with the Command and Control server using HTTPS and Firebase Cloud Messaging (FCM).[1][4] |
Mobile | T1429 | Audio Capture | ||
Mobile | T1616 | Call Control | ||
Mobile | T1533 | Data from Local System |
SpyC23 can collect and exfiltrate files with specific extensions, such as .pdf, doc.[1] |
|
Mobile | T1624 | .001 | Event Triggered Execution: Broadcast Receivers |
SpyC23 listens for the |
Mobile | T1628 | .001 | Hide Artifacts: Suppress Application Icon | |
.002 | Hide Artifacts: User Evasion |
SpyC23 has used blank screen overlays to hide malicious activity from the user.[1] |
||
Mobile | T1629 | .003 | Impair Defenses: Disable or Modify Tools | |
Mobile | T1544 | Ingress Tool Transfer |
SpyC23 can download more malware to the victim device.[1][8][5] |
|
Mobile | T1430 | Location Tracking | ||
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
SpyC23 has masqueraded as legitimate messaging applications.[1][8][4][5][6][7] |
Mobile | T1406 | Obfuscated Files or Information |
SpyC23 has used obfuscation techniques to hide its hardcoded C2 address.[1] |
|
Mobile | T1644 | Out of Band Data |
SpyC23 can receive Command and Control commands from SMS messages.[1] |
|
Mobile | T1636 | Protected User Data | ||
.003 | Contact List |
SpyC23 can exfiltrate the victim device’s contact list.[1][4][7] |
||
.004 | SMS Messages | |||
Mobile | T1513 | Screen Capture |
SpyC23 can take record and take screenshots of the victim device.[1][4] |
|
Mobile | T1582 | SMS Control | ||
Mobile | T1512 | Video Capture | ||
Mobile | T1633 | Virtualization/Sandbox Evasion |
SpyC23 has obfuscated code and anti-virtualization techniques to hinder analysis.[5] |