General

  • Target

    client.apk

  • Size

    760KB

  • Sample

    240526-rdbqyshf98

  • MD5

    4640b431802171feca25cb06fcd7cbc4

  • SHA1

    45d0aab087e792f460d63929a3c66c9e8a7003d2

  • SHA256

    f6d834d52c7f1bd13cfebafbeffe16af1b68420d1fe488c27be82b5652a5914f

  • SHA512

    1e6c4fda9a13817834a32ff35558b107c8e368254069ed4a4e77c7a3bc7a514184640dd71c768e41d5d61938f479aff827892c41924e47c0fe7275871dd0dafa

  • SSDEEP

    12288:N45Boa1a8Lze8rWK2P7P6J5WmpYshXZPbGwidNpg/:NJa1ame8N2TP6J5WmD9idNpI

Malware Config

Extracted

Family

spynote

C2

192.168.43.237:2200

Targets

    • Target

      client.apk

    • Size

      760KB

    • MD5

      4640b431802171feca25cb06fcd7cbc4

    • SHA1

      45d0aab087e792f460d63929a3c66c9e8a7003d2

    • SHA256

      f6d834d52c7f1bd13cfebafbeffe16af1b68420d1fe488c27be82b5652a5914f

    • SHA512

      1e6c4fda9a13817834a32ff35558b107c8e368254069ed4a4e77c7a3bc7a514184640dd71c768e41d5d61938f479aff827892c41924e47c0fe7275871dd0dafa

    • SSDEEP

      12288:N45Boa1a8Lze8rWK2P7P6J5WmpYshXZPbGwidNpg/:NJa1ame8N2TP6J5WmD9idNpI

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks