General

  • Target

    210d54a1c9ecec57fc36c46e53f18f69953c55f56a559bf144af69f8b67afa08

  • Size

    8.5MB

  • Sample

    240526-bemlvahf93

  • MD5

    17c7bba4f79e5deea857fd523f432124

  • SHA1

    2d8a5f60cfae666240c84201078e74a645b9a3b7

  • SHA256

    210d54a1c9ecec57fc36c46e53f18f69953c55f56a559bf144af69f8b67afa08

  • SHA512

    59e5fbd2ed2f9fb566b8808d7e47277c5dcf953595e89464521ca13487c319770a34b467ba2924d56265a65d94623bad45207d497cccfffa9540f75ca8af3641

  • SSDEEP

    49152:Dq0xuzatfr4LVPxct8ACWELIdGWkCcqAmz+zdGGPQTOfTUbYqp0cgcbxAh9V:zuC4LV5cmAEZWkxFmz+zBoTh0tc2V

Malware Config

Extracted

Family

spynote

C2

Federico244-32964.portmap.host:32964

Targets

    • Target

      210d54a1c9ecec57fc36c46e53f18f69953c55f56a559bf144af69f8b67afa08

    • Size

      8.5MB

    • MD5

      17c7bba4f79e5deea857fd523f432124

    • SHA1

      2d8a5f60cfae666240c84201078e74a645b9a3b7

    • SHA256

      210d54a1c9ecec57fc36c46e53f18f69953c55f56a559bf144af69f8b67afa08

    • SHA512

      59e5fbd2ed2f9fb566b8808d7e47277c5dcf953595e89464521ca13487c319770a34b467ba2924d56265a65d94623bad45207d497cccfffa9540f75ca8af3641

    • SSDEEP

      49152:Dq0xuzatfr4LVPxct8ACWELIdGWkCcqAmz+zdGGPQTOfTUbYqp0cgcbxAh9V:zuC4LV5cmAEZWkxFmz+zBoTh0tc2V

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Schedules tasks to execute at a specified time

      Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

MITRE ATT&CK Matrix

Tasks