General

  • Target

    f31d09753af1ff816669a19f690693e27330e97e13a3e287f2cfaca35dd2d2f6.bin

  • Size

    768KB

  • Sample

    240401-1x27pagd3y

  • MD5

    e7d0fa9f653432733a18f7bb0139d51b

  • SHA1

    92917f95a61c1523316df7dd7b3e7ea0ec00726a

  • SHA256

    f31d09753af1ff816669a19f690693e27330e97e13a3e287f2cfaca35dd2d2f6

  • SHA512

    783471a5e1a20c428353735aa8070ba7777fd7a6b9547aab9ab7fdbe686b852a15406aeff5ff1ece761d09a9ac3032ff3af5689fc10d281f1329f3bb055e5980

  • SSDEEP

    12288:12nbBZRvS0qHJmVU83RM5WmpYshXZPbGwidNpgW:cbBZRrqpm+83RM5WmD9idNpB

Malware Config

Extracted

Family

spynote

C2

androidsystem13-50063.portmap.io:50763

Targets

    • Target

      f31d09753af1ff816669a19f690693e27330e97e13a3e287f2cfaca35dd2d2f6.bin

    • Size

      768KB

    • MD5

      e7d0fa9f653432733a18f7bb0139d51b

    • SHA1

      92917f95a61c1523316df7dd7b3e7ea0ec00726a

    • SHA256

      f31d09753af1ff816669a19f690693e27330e97e13a3e287f2cfaca35dd2d2f6

    • SHA512

      783471a5e1a20c428353735aa8070ba7777fd7a6b9547aab9ab7fdbe686b852a15406aeff5ff1ece761d09a9ac3032ff3af5689fc10d281f1329f3bb055e5980

    • SSDEEP

      12288:12nbBZRvS0qHJmVU83RM5WmpYshXZPbGwidNpgW:cbBZRrqpm+83RM5WmD9idNpB

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks