General

  • Target

    078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35.apk

  • Size

    786KB

  • Sample

    240514-bdtnrsdc73

  • MD5

    16c6a4e7641df5cfea67144a2787230c

  • SHA1

    92c2fcbadd4a847a8fb16d62060ecf537c7ad71c

  • SHA256

    078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35

  • SHA512

    14b57c75f5b51412cb52cd7a24f4d90753e41c041f3fce070f5ba0f377e309318ba3472b66ca8c4cf71102d278f623ca3636cfdaae0cf630654c093b5e526b8f

  • SSDEEP

    12288:eLD9a1a8LzeEww/OCclww785WmpYshXZPbGwidNpgT:ia1ameCGC+ww785WmD9idNpc

Malware Config

Extracted

Family

spynote

C2

4.194.25.153:5214

Targets

    • Target

      078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35.apk

    • Size

      786KB

    • MD5

      16c6a4e7641df5cfea67144a2787230c

    • SHA1

      92c2fcbadd4a847a8fb16d62060ecf537c7ad71c

    • SHA256

      078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35

    • SHA512

      14b57c75f5b51412cb52cd7a24f4d90753e41c041f3fce070f5ba0f377e309318ba3472b66ca8c4cf71102d278f623ca3636cfdaae0cf630654c093b5e526b8f

    • SSDEEP

      12288:eLD9a1a8LzeEww/OCclww785WmpYshXZPbGwidNpgT:ia1ameCGC+ww785WmD9idNpc

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks