General

  • Target

    WhatsApp.apk

  • Size

    786KB

  • Sample

    240513-vsjxnafa41

  • MD5

    572589492cf56c19140b0f35e5205dbd

  • SHA1

    8fb0fe21bb0f3ee43702167c5b57f76397882264

  • SHA256

    8a91bf9ba1250e5f0977384101f5ff3c1d7dc121e7ed304e2580bac1082b7d61

  • SHA512

    ef08cf54f52b21826cddb9c1784c667471851687a14c907786b9df21201df27dc9f830555c8d55dda2c2b0249bd2e1e88d4552cd53e503ab75838b97c3399101

  • SSDEEP

    12288:QLcfa1a8Lzezw+8RB/lwlW75WmpYshXZPbGwidNpgY:ta1amebkBtwlW75WmD9idNpf

Malware Config

Extracted

Family

spynote

C2

4.194.25.153:5214

Targets

    • Target

      WhatsApp.apk

    • Size

      786KB

    • MD5

      572589492cf56c19140b0f35e5205dbd

    • SHA1

      8fb0fe21bb0f3ee43702167c5b57f76397882264

    • SHA256

      8a91bf9ba1250e5f0977384101f5ff3c1d7dc121e7ed304e2580bac1082b7d61

    • SHA512

      ef08cf54f52b21826cddb9c1784c667471851687a14c907786b9df21201df27dc9f830555c8d55dda2c2b0249bd2e1e88d4552cd53e503ab75838b97c3399101

    • SSDEEP

      12288:QLcfa1a8Lzezw+8RB/lwlW75WmpYshXZPbGwidNpgY:ta1amebkBtwlW75WmD9idNpf

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks