General

  • Target

    fcce8c7d7757e8d2d146488ade5a3d46e60fd30eb0f5972397803675bbf8a14e.bin

  • Size

    804KB

  • Sample

    240613-1wqr9swalk

  • MD5

    19b142ad191d470ad9d971549f3dc024

  • SHA1

    7622b74a6ee0a9a5027585fc1425560afdbdc032

  • SHA256

    fcce8c7d7757e8d2d146488ade5a3d46e60fd30eb0f5972397803675bbf8a14e

  • SHA512

    a581747b51812944e8a8d4e22595846df7da2e94da3064c80fc974a0e4def71d28734e26fe910fdbac91ea85499e7c9101dabb36e9f376af3125f2c46edf3b67

  • SSDEEP

    12288:t/J6sgRMLz3OwVSnvQ5WmpYshXZPbGwidNpgc9c:t/J6s9Lz+ISnvQ5WmD9idNp3c

Malware Config

Extracted

Family

spynote

C2

face-und.gl.at.ply.gg:32280

Targets

    • Target

      fcce8c7d7757e8d2d146488ade5a3d46e60fd30eb0f5972397803675bbf8a14e.bin

    • Size

      804KB

    • MD5

      19b142ad191d470ad9d971549f3dc024

    • SHA1

      7622b74a6ee0a9a5027585fc1425560afdbdc032

    • SHA256

      fcce8c7d7757e8d2d146488ade5a3d46e60fd30eb0f5972397803675bbf8a14e

    • SHA512

      a581747b51812944e8a8d4e22595846df7da2e94da3064c80fc974a0e4def71d28734e26fe910fdbac91ea85499e7c9101dabb36e9f376af3125f2c46edf3b67

    • SSDEEP

      12288:t/J6sgRMLz3OwVSnvQ5WmpYshXZPbGwidNpgc9c:t/J6s9Lz+ISnvQ5WmD9idNp3c

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Tries to add a device administrator.

MITRE ATT&CK Mobile v15

Tasks