General

  • Target

    107b8e65bcdb465da65b3dac004ec44bcf6d4b24ecc554af6f84aed150cf2846.bin

  • Size

    4.5MB

  • Sample

    240417-1xvgvagf7z

  • MD5

    ecc9dd436c7802480311732c85353045

  • SHA1

    d0d6b74aeec242edbd9019a5d3b202d716d89bfa

  • SHA256

    107b8e65bcdb465da65b3dac004ec44bcf6d4b24ecc554af6f84aed150cf2846

  • SHA512

    e7590f4fa47bf7ce98b6818040a2fa3bfc9abf645aaa81b0c477b07ed20439b3aa14ac4d4148ef7d1da48ca385b7fdb1294bdd6c706d55c40e9d59d461ac5fc2

  • SSDEEP

    98304:4yRtaWQ8DaW6PH2lCJMhh2kYOpSao/Kr1JZiWj9:ZKn8DqfTJ42QpFZiWJ

Malware Config

Extracted

Family

spynote

C2

near-beliefs.gl.at.ply.gg:24026

Targets

    • Target

      107b8e65bcdb465da65b3dac004ec44bcf6d4b24ecc554af6f84aed150cf2846.bin

    • Size

      4.5MB

    • MD5

      ecc9dd436c7802480311732c85353045

    • SHA1

      d0d6b74aeec242edbd9019a5d3b202d716d89bfa

    • SHA256

      107b8e65bcdb465da65b3dac004ec44bcf6d4b24ecc554af6f84aed150cf2846

    • SHA512

      e7590f4fa47bf7ce98b6818040a2fa3bfc9abf645aaa81b0c477b07ed20439b3aa14ac4d4148ef7d1da48ca385b7fdb1294bdd6c706d55c40e9d59d461ac5fc2

    • SSDEEP

      98304:4yRtaWQ8DaW6PH2lCJMhh2kYOpSao/Kr1JZiWj9:ZKn8DqfTJ42QpFZiWJ

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks