General

  • Target

    025e03b86cc4ba86493846f520b54cad.bin

  • Size

    1.9MB

  • Sample

    230913-bcqwgsbc86

  • MD5

    025e03b86cc4ba86493846f520b54cad

  • SHA1

    e7bf5eade97621895df0b9c72d69928feeee9c93

  • SHA256

    7e8a66852594a9789e1db2580dd5ed3a5be74684f2fd121a75e38f3a4954beab

  • SHA512

    99d226b342556d6e5a2d7edf8b42164c91648cd1ebb77eddd34307ca7d8a58be6ecc2c7d3530f24993f927249fd14b09d81212da8e5e0a2b768488377ed3ee8d

  • SSDEEP

    12288:R5wwCuRnMIzwCbnLlG+rWwEfW+l5Wc7Xn45:RAsMIzwCbLlG3PfWJc7Xs

Malware Config

Extracted

Family

spynote

C2

fee-harmful.gl.at.ply.gg:0.tcp.sa.ngrok.io:41934:18968

Extracted

Family

spynote

C2

fee-harmful.gl.at.ply.gg:0.tcp.sa.ngrok.io:41934:18968

Targets

    • Target

      025e03b86cc4ba86493846f520b54cad.bin

    • Size

      1.9MB

    • MD5

      025e03b86cc4ba86493846f520b54cad

    • SHA1

      e7bf5eade97621895df0b9c72d69928feeee9c93

    • SHA256

      7e8a66852594a9789e1db2580dd5ed3a5be74684f2fd121a75e38f3a4954beab

    • SHA512

      99d226b342556d6e5a2d7edf8b42164c91648cd1ebb77eddd34307ca7d8a58be6ecc2c7d3530f24993f927249fd14b09d81212da8e5e0a2b768488377ed3ee8d

    • SSDEEP

      12288:R5wwCuRnMIzwCbnLlG+rWwEfW+l5Wc7Xn45:RAsMIzwCbLlG3PfWJc7Xs

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Removes its main activity from the application launcher

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Legitimate hosting services abused for malware hosting/C2

    • Removes a system notification.

MITRE ATT&CK Enterprise v15

Tasks