Skip to main content

The new SparkKitty Trojan spy in the App Store and Google Play

Medium
Published: Mon Jun 23 2025 (06/23/2025, 09:21:34 UTC)
Source: AlienVault OTX General

Description

A new spyware campaign dubbed SparkKitty has been discovered targeting both iOS and Android devices. The malware, believed to be connected to the previously identified SparkCat campaign, is distributed through official app stores and unofficial sources. It primarily steals photos from infected devices, likely searching for cryptocurrency wallet information. The campaign has been active since at least February 2024 and mainly targets users in Southeast Asia and China. The malware is embedded in various apps, including modified versions of popular applications like TikTok, and uses different techniques to evade detection. The researchers identified multiple variations of the malware, including obfuscated libraries and malicious frameworks mimicking legitimate ones.

AI-Powered Analysis

AILast updated: 06/24/2025, 14:19:30 UTC

Technical Analysis

The SparkKitty Trojan is a spyware campaign targeting both iOS and Android mobile devices, discovered to be active since at least February 2024. It is believed to be linked to the earlier SparkCat campaign. The malware is distributed through both official app stores (Apple App Store and Google Play) and unofficial sources, increasing its reach and infection vectors. SparkKitty is embedded within various applications, including modified versions of popular apps such as TikTok, which helps it evade detection by masquerading as legitimate software. The malware employs obfuscated libraries and malicious frameworks that mimic legitimate ones, complicating detection and analysis efforts. Its primary objective is to steal photos from infected devices, with a likely focus on extracting cryptocurrency wallet information, which is often stored as images or QR codes. The campaign mainly targets users in Southeast Asia and China, but the presence in official app stores implies potential for wider distribution. The malware uses techniques consistent with known tactics such as user execution (T1204.002), input capture (T1056), and malicious code injection or framework manipulation (T1176). Despite its medium severity rating, the campaign's persistence, multi-platform targeting, and use of legitimate distribution channels make it a significant threat to mobile users. No known exploits in the wild have been reported beyond the malware's distribution itself, and no specific affected versions are listed, indicating a broad potential impact across device models and OS versions.

Potential Impact

For European organizations, the direct impact of SparkKitty may be limited compared to its primary targets in Southeast Asia and China. However, the malware's presence in official app stores and its targeting of popular apps like TikTok means that European users and organizations with employees using mobile devices for work could be at risk. The theft of photos, particularly those containing sensitive information such as cryptocurrency wallets, could lead to financial losses and privacy breaches. Additionally, if employees use infected devices to access corporate resources, there is a risk of lateral movement or data leakage. The spyware's ability to evade detection and its embedding in legitimate apps complicate incident response and increase the risk of prolonged undetected presence. Given the increasing use of mobile devices in European workplaces, especially in sectors like finance, technology, and media, the campaign could indirectly affect organizational confidentiality and integrity. The malware does not appear to cause direct availability disruption but poses a significant confidentiality threat.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to official app stores only and use app vetting tools to detect modified or suspicious apps. 2) Deploy mobile threat defense (MTD) solutions capable of detecting obfuscated malware and anomalous app behaviors on both iOS and Android devices. 3) Educate employees about the risks of installing unofficial or modified apps, emphasizing the dangers of sideloading and the importance of verifying app authenticity. 4) Monitor network traffic for unusual data exfiltration patterns, especially large or frequent photo uploads from mobile devices. 5) Encourage users to secure cryptocurrency wallets using hardware wallets or apps with strong security features rather than storing wallet information as images on devices. 6) Regularly update mobile OS and apps to benefit from the latest security patches and detection improvements. 7) Conduct periodic security audits and threat hunting focused on mobile endpoints to identify potential infections early. 8) Collaborate with cybersecurity vendors to stay informed about emerging SparkKitty variants and detection signatures.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/sparkkitty-ios-android-malware/116793"]
Adversary
null
Pulse Id
68591c9e9f558b9315dda50d
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip120.78.239.17
ip23.249.28.200
ip120.79.8.107
ip23.249.28.88
ip39.108.186.119
ip47.119.171.161

Hash

ValueDescriptionCopy
hash0752edcf5fd61b0e4a1e01371ba605fd
hash0993bae47c6fb3e885f34cb9316717a3
hash0aa1f8f36980f3dfe8884f1c6f5d6ddc
hash0b7891114d3b322ee863e4eef94d8523
hash0d09c4f956bb734586cee85887ed5407
hash0d7ed6df0e0cd9b5b38712d17857c824
hash1346f987f6aa1db5e6deb59af8e5744a
hash149785056bf16a9c6964c0ea4217b42b
hash1b85522b964b38de67c5d2b670bb30b1
hash21a257e3b51561e5ff20005ca8f0da65
hash21ef7a14fee3f64576f5780a637c57d1
hash2accfc13aaf4fa389149c0a03ce0ee4b
hash2b43b8c757c872a19a30dcdcff45e4d8
hash2d2b25279ef9365420acec120b98b3b4
hash2dc565c067e60a1a9656b9a5765db11d
hash307a64e335065c00c19e94c1f0a896f2
hash3388b5ea9997328eb48977ab351ca8de
hash3734e845657c37ee849618e2b4476bf4
hash44bc648d1c10bc88f9b6ad78d3e3f967
hash489217cca81823af56d141c985bb9b2c
hash530a5aa62fdcca7a8b4f60048450da70
hash5b2e4ea7ab929c766c9c7359995cdde0
hash5e15b25f07020a5314f0068b474fff3d
hash5e47604058722dae03f329a2e6693485
hash66434dd4402dfe7dda81f834c4b70a82
hash6d39cd8421591fbb0cc2a0bce4d0357d
hash6fe6885b8f6606b25178822d7894ac35
hash7e6324efc3acdb423f8e3b50edd5c5e5
hash8c9a93e829cba8c4607a7265e6988646
hash8cfc8081559008585b4e4a23cd4e1a7f
hash931085b04c0b6e23185025b69563d2ce
hash931399987a261df91b21856940479634
hash9aeaf9a485a60dc3de0b26b060bc8218
hasha44cbed18dc5d7fff11406cc403224b9
hasha4cca2431aa35bb68581a4e848804598
hashaa5ce6fed4f9d888cbf8d6d8d0cda07f
hashb0976d46970314532bc118f522bb8a6f
hashb0eda03d7e4265fe280360397c042494
hashb3085cd623b57fd6561e964d6fd73413
hashb4489cb4fac743246f29abf7f605dd15
hashc5be3ae482d25c6537e08c888a742832
hashc6a7568134622007de026d22257502d5
hashcc919d4bbd3fb2098d1aeb516f356cca
hashce49a90c0a098e8737e266471d323626
hashd4f42319a78b6605cabb5696bacb4677
hashd851b19b5b587f202795e10b72ced6e1
hashe5186be781f870377b6542b3cecfb622
hashe8b60bf5af2d5cc5c501b87d04b8a6c2
hashe9f7d9bc988e7569f999f0028b359720
hashec068e0fc6ffda97685237d8ab8a0f56
hashf0460bdca0f04d3bd4fc59d73b52233b
hashf0815908bafd88d71db660723b65fba4
hashf10a4fdffc884089ae93b0372ff9d5d1
hashf9ab4769b63a571107f2709b5b14e2bc
hashfa0e99bac48bc60aa0ae82bc0fd1698d
hashfd4558a9b629b5abe65a649b57bef20c
hashfe0868c4f40cbb42eb58af121570e64d
hash5861f7d50d9000fd43ea1552164e7d1f850f0c9b
hash8a84ce9cbf239fc8a3e7e3ed0b4f0050b7113e92
hashf9182892299b52b2236fd98c1262e2f0837e1683
hash5b4d879862d8bd8af65a4151967990ef830b8c41a812cfa22fa117b54dcc0da6
hash9ca063d5716155d9e70ebda9370655c65dcf82bd013cc4b8fa7ebc4cee564073
hashcdbe32fcb10606846035fff7c2f54d1b4306ef08c69364b9699b41dc695f41cd

Domain

ValueDescriptionCopy
domainaccgngrid.com
domainbyteepic.vip
domainmoabc.vip
domainapi.fxsdk.com
domainh1997.tiktokapp.club
domaini.bicoin.com.cn
domainlt.laoqianf14.top
domainlt.laoqianf15.top
domainlt.laoqianf51.top
domainxt.xinqianf38.top
domainyjhjymfjnj.wyxbmh.cn

Threat ID: 685ab3b48e5e669c7fb5ad1b

Added to database: 6/24/2025, 2:18:28 PM

Last enriched: 6/24/2025, 2:19:30 PM

Last updated: 8/16/2025, 1:57:17 PM

Views: 43

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats