General

  • Target

    16c6a4e7641df5cfea67144a2787230c.bin

  • Size

    507KB

  • Sample

    240515-bc6a6shc4z

  • MD5

    6b15ab2210039b613bd6ad6ea4233cdb

  • SHA1

    ca2f102919ec306d600d7f6562b0d342d8a878aa

  • SHA256

    c777791e1f9da5063fa0d0037713991171c7499bebc594834cb248e4a4c1ea35

  • SHA512

    0222c36524f2bc339014ef1d3bf088782e199d3bbb743531d6a7c864ebcc737c96e33219f91f00905b4a6ae9255ab46b445dcca8bd12fa6389127054f08ab409

  • SSDEEP

    12288:ZSHLYge3SOoZgKIVVN4WgYSb6Yr4EOArYk2HqDwu06+tQ:wHkn3SRZgKIRjgYSb6Yr4EOArYknh+q

Malware Config

Extracted

Family

spynote

C2

4.194.25.153:5214

Targets

    • Target

      078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35.apk

    • Size

      786KB

    • MD5

      16c6a4e7641df5cfea67144a2787230c

    • SHA1

      92c2fcbadd4a847a8fb16d62060ecf537c7ad71c

    • SHA256

      078cebddba654c215c01f04900987a34233bddbcc26696e1417b5d3cc6e90e35

    • SHA512

      14b57c75f5b51412cb52cd7a24f4d90753e41c041f3fce070f5ba0f377e309318ba3472b66ca8c4cf71102d278f623ca3636cfdaae0cf630654c093b5e526b8f

    • SSDEEP

      12288:eLD9a1a8LzeEww/OCclww785WmpYshXZPbGwidNpgT:ia1ameCGC+ww785WmD9idNpc

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

    • Tries to add a device administrator.

MITRE ATT&CK Matrix

Tasks