General

  • Target

    client.apk

  • Size

    844KB

  • Sample

    240227-xxxenahd4v

  • MD5

    353181d288ff1a7a04161112cf6c8320

  • SHA1

    b820e9715699e1da7439e27801badb0775911419

  • SHA256

    028c4790926c2318cef9f3f8d1f54eb94118baa12b6989f12e44944921843100

  • SHA512

    2f3c7bdae98489c5757fe59477bc24f51f9260e99474eb4db2fb757357e22922221f945912a256a44df34626ed077a78ad4ba60665496481aa441b083b5fb827

  • SSDEEP

    12288:bmjtg8DVQu1CSujzo8sKPAoDi4YQedJFBc0HH5jg63BA1:bStNCSuPo8sKPAouJw0HHa63e1

Malware Config

Extracted

Family

spynote

C2

king00034-46009.portmap.io:46009

Targets

    • Target

      client.apk

    • Size

      844KB

    • MD5

      353181d288ff1a7a04161112cf6c8320

    • SHA1

      b820e9715699e1da7439e27801badb0775911419

    • SHA256

      028c4790926c2318cef9f3f8d1f54eb94118baa12b6989f12e44944921843100

    • SHA512

      2f3c7bdae98489c5757fe59477bc24f51f9260e99474eb4db2fb757357e22922221f945912a256a44df34626ed077a78ad4ba60665496481aa441b083b5fb827

    • SSDEEP

      12288:bmjtg8DVQu1CSujzo8sKPAoDi4YQedJFBc0HH5jg63BA1:bStNCSuPo8sKPAouJw0HHa63e1

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks