Android/SpyAgent

Android/SpyAgent is a variant of spyware in the MoqHao phishing campaign primarily targeting Korean and Japanese users.[1] Fake security applications were used to target Japanese users, while fake police applications were used to target Korean users. Both fake applications have common C2 commands and share the same crash report key on a cloud service.[1]

ID: S1214
Type: MALWARE
Platforms: Android
Version: 1.0
Created: 24 March 2025
Last Modified: 27 March 2025

Techniques Used

Domain ID Name Use
Mobile T1616 Call Control

Android/SpyAgent can execute an automated phone call.[1]

Mobile T1629 .003 Impair Defenses: Disable or Modify Tools

Android/SpyAgent has attempted to detect anti-spam call applications.[1]

Mobile T1655 .001 Masquerading: Match Legitimate Name or Location

Android/SpyAgent has used the official icon of the Korean police application and the package name "kpo," which contain references related to the Korean police.[1]

Mobile T1406 Obfuscated Files or Information

Android/SpyAgent has used the Tencent packer to hide its malicious payload.[1]

Mobile T1636 .004 Protected User Data: SMS Messages

Android/SpyAgent has exfiltrated SMS and MMS messages.[1]

Mobile T1422 System Network Configuration Discovery

Android/SpyAgent has collected device network information, such as the IMEI and the phone number.[1]

Mobile T1481 Web Service

Android/SpyAgent’s payload has obtained the C2 address via Twitter accounts.[1]

.001 Dead Drop Resolver

Android/SpyAgent has used the Tencent Push Notification Service to receive commands from the C2 server.[1]

References