The new SparkKitty Trojan spy in the App Store and Google Play
A new spyware campaign dubbed SparkKitty has been discovered targeting both iOS and Android devices. The malware, believed to be connected to the previously identified SparkCat campaign, is distributed through official app stores and unofficial sources. It primarily steals photos from infected devices, likely searching for cryptocurrency wallet information. The campaign has been active since at least February 2024 and mainly targets users in Southeast Asia and China. The malware is embedded in various apps, including modified versions of popular applications like TikTok, and uses different techniques to evade detection. The researchers identified multiple variations of the malware, including obfuscated libraries and malicious frameworks mimicking legitimate ones.
AI Analysis
Technical Summary
The SparkKitty Trojan is a spyware campaign targeting both iOS and Android mobile devices, discovered to be active since at least February 2024. It is believed to be linked to the earlier SparkCat campaign. The malware is distributed through both official app stores (Apple App Store and Google Play) and unofficial sources, increasing its reach and infection vectors. SparkKitty is embedded within various applications, including modified versions of popular apps such as TikTok, which helps it evade detection by masquerading as legitimate software. The malware employs obfuscated libraries and malicious frameworks that mimic legitimate ones, complicating detection and analysis efforts. Its primary objective is to steal photos from infected devices, with a likely focus on extracting cryptocurrency wallet information, which is often stored as images or QR codes. The campaign mainly targets users in Southeast Asia and China, but the presence in official app stores implies potential for wider distribution. The malware uses techniques consistent with known tactics such as user execution (T1204.002), input capture (T1056), and malicious code injection or framework manipulation (T1176). Despite its medium severity rating, the campaign's persistence, multi-platform targeting, and use of legitimate distribution channels make it a significant threat to mobile users. No known exploits in the wild have been reported beyond the malware's distribution itself, and no specific affected versions are listed, indicating a broad potential impact across device models and OS versions.
Potential Impact
For European organizations, the direct impact of SparkKitty may be limited compared to its primary targets in Southeast Asia and China. However, the malware's presence in official app stores and its targeting of popular apps like TikTok means that European users and organizations with employees using mobile devices for work could be at risk. The theft of photos, particularly those containing sensitive information such as cryptocurrency wallets, could lead to financial losses and privacy breaches. Additionally, if employees use infected devices to access corporate resources, there is a risk of lateral movement or data leakage. The spyware's ability to evade detection and its embedding in legitimate apps complicate incident response and increase the risk of prolonged undetected presence. Given the increasing use of mobile devices in European workplaces, especially in sectors like finance, technology, and media, the campaign could indirectly affect organizational confidentiality and integrity. The malware does not appear to cause direct availability disruption but poses a significant confidentiality threat.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to official app stores only and use app vetting tools to detect modified or suspicious apps. 2) Deploy mobile threat defense (MTD) solutions capable of detecting obfuscated malware and anomalous app behaviors on both iOS and Android devices. 3) Educate employees about the risks of installing unofficial or modified apps, emphasizing the dangers of sideloading and the importance of verifying app authenticity. 4) Monitor network traffic for unusual data exfiltration patterns, especially large or frequent photo uploads from mobile devices. 5) Encourage users to secure cryptocurrency wallets using hardware wallets or apps with strong security features rather than storing wallet information as images on devices. 6) Regularly update mobile OS and apps to benefit from the latest security patches and detection improvements. 7) Conduct periodic security audits and threat hunting focused on mobile endpoints to identify potential infections early. 8) Collaborate with cybersecurity vendors to stay informed about emerging SparkKitty variants and detection signatures.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- ip: 120.78.239.17
- ip: 23.249.28.200
- hash: 0752edcf5fd61b0e4a1e01371ba605fd
- hash: 0993bae47c6fb3e885f34cb9316717a3
- hash: 0aa1f8f36980f3dfe8884f1c6f5d6ddc
- hash: 0b7891114d3b322ee863e4eef94d8523
- hash: 0d09c4f956bb734586cee85887ed5407
- hash: 0d7ed6df0e0cd9b5b38712d17857c824
- hash: 1346f987f6aa1db5e6deb59af8e5744a
- hash: 149785056bf16a9c6964c0ea4217b42b
- hash: 1b85522b964b38de67c5d2b670bb30b1
- hash: 21a257e3b51561e5ff20005ca8f0da65
- hash: 21ef7a14fee3f64576f5780a637c57d1
- hash: 2accfc13aaf4fa389149c0a03ce0ee4b
- hash: 2b43b8c757c872a19a30dcdcff45e4d8
- hash: 2d2b25279ef9365420acec120b98b3b4
- hash: 2dc565c067e60a1a9656b9a5765db11d
- hash: 307a64e335065c00c19e94c1f0a896f2
- hash: 3388b5ea9997328eb48977ab351ca8de
- hash: 3734e845657c37ee849618e2b4476bf4
- hash: 44bc648d1c10bc88f9b6ad78d3e3f967
- hash: 489217cca81823af56d141c985bb9b2c
- hash: 530a5aa62fdcca7a8b4f60048450da70
- hash: 5b2e4ea7ab929c766c9c7359995cdde0
- hash: 5e15b25f07020a5314f0068b474fff3d
- hash: 5e47604058722dae03f329a2e6693485
- hash: 66434dd4402dfe7dda81f834c4b70a82
- hash: 6d39cd8421591fbb0cc2a0bce4d0357d
- hash: 6fe6885b8f6606b25178822d7894ac35
- hash: 7e6324efc3acdb423f8e3b50edd5c5e5
- hash: 8c9a93e829cba8c4607a7265e6988646
- hash: 8cfc8081559008585b4e4a23cd4e1a7f
- hash: 931085b04c0b6e23185025b69563d2ce
- hash: 931399987a261df91b21856940479634
- hash: 9aeaf9a485a60dc3de0b26b060bc8218
- hash: a44cbed18dc5d7fff11406cc403224b9
- hash: a4cca2431aa35bb68581a4e848804598
- hash: aa5ce6fed4f9d888cbf8d6d8d0cda07f
- hash: b0976d46970314532bc118f522bb8a6f
- hash: b0eda03d7e4265fe280360397c042494
- hash: b3085cd623b57fd6561e964d6fd73413
- hash: b4489cb4fac743246f29abf7f605dd15
- hash: c5be3ae482d25c6537e08c888a742832
- hash: c6a7568134622007de026d22257502d5
- hash: cc919d4bbd3fb2098d1aeb516f356cca
- hash: ce49a90c0a098e8737e266471d323626
- hash: d4f42319a78b6605cabb5696bacb4677
- hash: d851b19b5b587f202795e10b72ced6e1
- hash: e5186be781f870377b6542b3cecfb622
- hash: e8b60bf5af2d5cc5c501b87d04b8a6c2
- hash: e9f7d9bc988e7569f999f0028b359720
- hash: ec068e0fc6ffda97685237d8ab8a0f56
- hash: f0460bdca0f04d3bd4fc59d73b52233b
- hash: f0815908bafd88d71db660723b65fba4
- hash: f10a4fdffc884089ae93b0372ff9d5d1
- hash: f9ab4769b63a571107f2709b5b14e2bc
- hash: fa0e99bac48bc60aa0ae82bc0fd1698d
- hash: fd4558a9b629b5abe65a649b57bef20c
- hash: fe0868c4f40cbb42eb58af121570e64d
- hash: 5861f7d50d9000fd43ea1552164e7d1f850f0c9b
- hash: 8a84ce9cbf239fc8a3e7e3ed0b4f0050b7113e92
- hash: f9182892299b52b2236fd98c1262e2f0837e1683
- hash: 5b4d879862d8bd8af65a4151967990ef830b8c41a812cfa22fa117b54dcc0da6
- hash: 9ca063d5716155d9e70ebda9370655c65dcf82bd013cc4b8fa7ebc4cee564073
- hash: cdbe32fcb10606846035fff7c2f54d1b4306ef08c69364b9699b41dc695f41cd
- ip: 120.79.8.107
- ip: 23.249.28.88
- ip: 39.108.186.119
- ip: 47.119.171.161
- domain: accgngrid.com
- domain: byteepic.vip
- domain: moabc.vip
- domain: api.fxsdk.com
- domain: h1997.tiktokapp.club
- domain: i.bicoin.com.cn
- domain: lt.laoqianf14.top
- domain: lt.laoqianf15.top
- domain: lt.laoqianf51.top
- domain: xt.xinqianf38.top
- domain: yjhjymfjnj.wyxbmh.cn
The new SparkKitty Trojan spy in the App Store and Google Play
Description
A new spyware campaign dubbed SparkKitty has been discovered targeting both iOS and Android devices. The malware, believed to be connected to the previously identified SparkCat campaign, is distributed through official app stores and unofficial sources. It primarily steals photos from infected devices, likely searching for cryptocurrency wallet information. The campaign has been active since at least February 2024 and mainly targets users in Southeast Asia and China. The malware is embedded in various apps, including modified versions of popular applications like TikTok, and uses different techniques to evade detection. The researchers identified multiple variations of the malware, including obfuscated libraries and malicious frameworks mimicking legitimate ones.
AI-Powered Analysis
Technical Analysis
The SparkKitty Trojan is a spyware campaign targeting both iOS and Android mobile devices, discovered to be active since at least February 2024. It is believed to be linked to the earlier SparkCat campaign. The malware is distributed through both official app stores (Apple App Store and Google Play) and unofficial sources, increasing its reach and infection vectors. SparkKitty is embedded within various applications, including modified versions of popular apps such as TikTok, which helps it evade detection by masquerading as legitimate software. The malware employs obfuscated libraries and malicious frameworks that mimic legitimate ones, complicating detection and analysis efforts. Its primary objective is to steal photos from infected devices, with a likely focus on extracting cryptocurrency wallet information, which is often stored as images or QR codes. The campaign mainly targets users in Southeast Asia and China, but the presence in official app stores implies potential for wider distribution. The malware uses techniques consistent with known tactics such as user execution (T1204.002), input capture (T1056), and malicious code injection or framework manipulation (T1176). Despite its medium severity rating, the campaign's persistence, multi-platform targeting, and use of legitimate distribution channels make it a significant threat to mobile users. No known exploits in the wild have been reported beyond the malware's distribution itself, and no specific affected versions are listed, indicating a broad potential impact across device models and OS versions.
Potential Impact
For European organizations, the direct impact of SparkKitty may be limited compared to its primary targets in Southeast Asia and China. However, the malware's presence in official app stores and its targeting of popular apps like TikTok means that European users and organizations with employees using mobile devices for work could be at risk. The theft of photos, particularly those containing sensitive information such as cryptocurrency wallets, could lead to financial losses and privacy breaches. Additionally, if employees use infected devices to access corporate resources, there is a risk of lateral movement or data leakage. The spyware's ability to evade detection and its embedding in legitimate apps complicate incident response and increase the risk of prolonged undetected presence. Given the increasing use of mobile devices in European workplaces, especially in sectors like finance, technology, and media, the campaign could indirectly affect organizational confidentiality and integrity. The malware does not appear to cause direct availability disruption but poses a significant confidentiality threat.
Mitigation Recommendations
European organizations should implement the following specific mitigation measures: 1) Enforce strict mobile device management (MDM) policies that restrict installation of apps to official app stores only and use app vetting tools to detect modified or suspicious apps. 2) Deploy mobile threat defense (MTD) solutions capable of detecting obfuscated malware and anomalous app behaviors on both iOS and Android devices. 3) Educate employees about the risks of installing unofficial or modified apps, emphasizing the dangers of sideloading and the importance of verifying app authenticity. 4) Monitor network traffic for unusual data exfiltration patterns, especially large or frequent photo uploads from mobile devices. 5) Encourage users to secure cryptocurrency wallets using hardware wallets or apps with strong security features rather than storing wallet information as images on devices. 6) Regularly update mobile OS and apps to benefit from the latest security patches and detection improvements. 7) Conduct periodic security audits and threat hunting focused on mobile endpoints to identify potential infections early. 8) Collaborate with cybersecurity vendors to stay informed about emerging SparkKitty variants and detection signatures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/sparkkitty-ios-android-malware/116793"]
- Adversary
- null
- Pulse Id
- 68591c9e9f558b9315dda50d
- Threat Score
- null
Indicators of Compromise
Ip
Value | Description | Copy |
---|---|---|
ip120.78.239.17 | — | |
ip23.249.28.200 | — | |
ip120.79.8.107 | — | |
ip23.249.28.88 | — | |
ip39.108.186.119 | — | |
ip47.119.171.161 | — |
Hash
Value | Description | Copy |
---|---|---|
hash0752edcf5fd61b0e4a1e01371ba605fd | — | |
hash0993bae47c6fb3e885f34cb9316717a3 | — | |
hash0aa1f8f36980f3dfe8884f1c6f5d6ddc | — | |
hash0b7891114d3b322ee863e4eef94d8523 | — | |
hash0d09c4f956bb734586cee85887ed5407 | — | |
hash0d7ed6df0e0cd9b5b38712d17857c824 | — | |
hash1346f987f6aa1db5e6deb59af8e5744a | — | |
hash149785056bf16a9c6964c0ea4217b42b | — | |
hash1b85522b964b38de67c5d2b670bb30b1 | — | |
hash21a257e3b51561e5ff20005ca8f0da65 | — | |
hash21ef7a14fee3f64576f5780a637c57d1 | — | |
hash2accfc13aaf4fa389149c0a03ce0ee4b | — | |
hash2b43b8c757c872a19a30dcdcff45e4d8 | — | |
hash2d2b25279ef9365420acec120b98b3b4 | — | |
hash2dc565c067e60a1a9656b9a5765db11d | — | |
hash307a64e335065c00c19e94c1f0a896f2 | — | |
hash3388b5ea9997328eb48977ab351ca8de | — | |
hash3734e845657c37ee849618e2b4476bf4 | — | |
hash44bc648d1c10bc88f9b6ad78d3e3f967 | — | |
hash489217cca81823af56d141c985bb9b2c | — | |
hash530a5aa62fdcca7a8b4f60048450da70 | — | |
hash5b2e4ea7ab929c766c9c7359995cdde0 | — | |
hash5e15b25f07020a5314f0068b474fff3d | — | |
hash5e47604058722dae03f329a2e6693485 | — | |
hash66434dd4402dfe7dda81f834c4b70a82 | — | |
hash6d39cd8421591fbb0cc2a0bce4d0357d | — | |
hash6fe6885b8f6606b25178822d7894ac35 | — | |
hash7e6324efc3acdb423f8e3b50edd5c5e5 | — | |
hash8c9a93e829cba8c4607a7265e6988646 | — | |
hash8cfc8081559008585b4e4a23cd4e1a7f | — | |
hash931085b04c0b6e23185025b69563d2ce | — | |
hash931399987a261df91b21856940479634 | — | |
hash9aeaf9a485a60dc3de0b26b060bc8218 | — | |
hasha44cbed18dc5d7fff11406cc403224b9 | — | |
hasha4cca2431aa35bb68581a4e848804598 | — | |
hashaa5ce6fed4f9d888cbf8d6d8d0cda07f | — | |
hashb0976d46970314532bc118f522bb8a6f | — | |
hashb0eda03d7e4265fe280360397c042494 | — | |
hashb3085cd623b57fd6561e964d6fd73413 | — | |
hashb4489cb4fac743246f29abf7f605dd15 | — | |
hashc5be3ae482d25c6537e08c888a742832 | — | |
hashc6a7568134622007de026d22257502d5 | — | |
hashcc919d4bbd3fb2098d1aeb516f356cca | — | |
hashce49a90c0a098e8737e266471d323626 | — | |
hashd4f42319a78b6605cabb5696bacb4677 | — | |
hashd851b19b5b587f202795e10b72ced6e1 | — | |
hashe5186be781f870377b6542b3cecfb622 | — | |
hashe8b60bf5af2d5cc5c501b87d04b8a6c2 | — | |
hashe9f7d9bc988e7569f999f0028b359720 | — | |
hashec068e0fc6ffda97685237d8ab8a0f56 | — | |
hashf0460bdca0f04d3bd4fc59d73b52233b | — | |
hashf0815908bafd88d71db660723b65fba4 | — | |
hashf10a4fdffc884089ae93b0372ff9d5d1 | — | |
hashf9ab4769b63a571107f2709b5b14e2bc | — | |
hashfa0e99bac48bc60aa0ae82bc0fd1698d | — | |
hashfd4558a9b629b5abe65a649b57bef20c | — | |
hashfe0868c4f40cbb42eb58af121570e64d | — | |
hash5861f7d50d9000fd43ea1552164e7d1f850f0c9b | — | |
hash8a84ce9cbf239fc8a3e7e3ed0b4f0050b7113e92 | — | |
hashf9182892299b52b2236fd98c1262e2f0837e1683 | — | |
hash5b4d879862d8bd8af65a4151967990ef830b8c41a812cfa22fa117b54dcc0da6 | — | |
hash9ca063d5716155d9e70ebda9370655c65dcf82bd013cc4b8fa7ebc4cee564073 | — | |
hashcdbe32fcb10606846035fff7c2f54d1b4306ef08c69364b9699b41dc695f41cd | — |
Domain
Value | Description | Copy |
---|---|---|
domainaccgngrid.com | — | |
domainbyteepic.vip | — | |
domainmoabc.vip | — | |
domainapi.fxsdk.com | — | |
domainh1997.tiktokapp.club | — | |
domaini.bicoin.com.cn | — | |
domainlt.laoqianf14.top | — | |
domainlt.laoqianf15.top | — | |
domainlt.laoqianf51.top | — | |
domainxt.xinqianf38.top | — | |
domainyjhjymfjnj.wyxbmh.cn | — |
Threat ID: 685ab3b48e5e669c7fb5ad1b
Added to database: 6/24/2025, 2:18:28 PM
Last enriched: 6/24/2025, 2:19:30 PM
Last updated: 8/16/2025, 1:57:17 PM
Views: 43
Related Threats
ThreatFox IOCs for 2025-08-17
MediumThreatFox IOCs for 2025-08-16
MediumScammers Compromised by Own Malware, Expose $4.67M Operation and Identities
MediumThreatFox IOCs for 2025-08-15
MediumThreat Actor Profile: Interlock Ransomware
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.